Code Injection Vulnerability in Kargo Software Management by Akuity
CVE-2026-27112
What is CVE-2026-27112?
Kargo, a software artifact management and automation tool, contains a vulnerability in the batch resource creation endpoints of its legacy gRPC API and REST API. This flaw allows specially crafted multi-document YAML payloads to exploit a logic bug, enabling attackers to inject arbitrary resources into an existing project's namespace with the API server's permissions. This unauthorized access can lead to privilege escalation, remote code execution, or the exfiltration of sensitive secrets such as artifact repository credentials. In certain configurations, attackers can use elevated permissions to execute further attacks using kubectl, simplifying the exploitation process. The vulnerability has been addressed in versions v1.7.8, v1.8.11, and v1.9.3.
Affected Version(s)
kargo >= 1.9.0-rc.1, < 1.9.3 < 1.9.0-rc.1, 1.9.3
kargo >= 1.8.0-rc.1, < 1.8.11 < 1.8.0-rc.1, 1.8.11
kargo >= 1.7.0, < 1.7.8 < 1.7.0, 1.7.8
