CVE-2026-22822
EUVD-2026-340421.01.2026, 22:15
External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Starting in version 0.20.2 and prior to version 1.2.0, the `getSecretKey` template function, while introduced for senhasegura Devops Secrets Management (DSM) provider, has the ability to fetch secrets cross-namespaces with the roleBinding of the external-secrets controller, bypassing our security mechanisms. This function was completely removed in version 1.2.0, as everything done with that templating function can be done in a different way while respecting External Secrets Operator's safeguards As a workaround, use a policy engine such as Kubernetes, Kyverno, Kubewarden, or OPA to prevent the usage of `getSecretKey` in any ExternalSecret resource.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| external-secrets | external_secrets_operator | 0.20.2 ≤ 𝑥 < 1.2.0 |
𝑥
= Vulnerable software versions