Authorization Flaw in Kargo Affects Software Promotion Management
CVE-2026-27111

5.3MEDIUM

Key Information:

Vendor

Akuity

Status
Vendor
CVE Published:
20 February 2026

What is CVE-2026-27111?

Kargo, a tool for managing software artifacts, has a critical authorization loophole in versions 1.9.0 to 1.9.2. While its legacy gRPC API enforces strict access controls regarding software promotions, the newer REST API fails to impose the same checks on three specific endpoints. This vulnerability allows users with standard permissions to circumvent intended boundaries, potentially compromising sensitive operations in the promotion pipeline. This issue has been addressed in version 1.9.3.

Affected Version(s)

kargo >= 1.9.0, < 1.9.3

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.