Authentication Flaw in Multicluster Engine by Red Hat Permits Unauthorized Access
CVE-2026-7163
What is CVE-2026-7163?
A vulnerability exists in the assisted-service REST API within the optional Assisted Installer component of the Multicluster Engine (MCE) from Red Hat. This flaw enables authenticated users with limited namespace-scoped privileges to retrieve administrative credentials for any clusters provisioned via the hub. The compromised endpoints, /v2/clusters/{cluster_id}/credentials and the kubeconfig download endpoint, operate in AUTH_TYPE=local, enabling attackers with a valid JSON Web Token (JWT) to gain unlimited administrative access. The system inadequately secures sensitive information, allowing users with basic access to view and exploit plaintext query parameters containing the valid JWT. Successful exploitation effectively grants attackers the kubeadmin password and kubeconfig for OpenShift clusters linked to the compromised hub, posing a severe risk of unauthorized root-level access.
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved