Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rmx9-2pp3-xhcr | Tekton Pipelines has VerificationPolicy regex pattern bypass via substring matching |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 01 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation tekton Pipelines |
|
| CPEs | cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation tekton Pipelines |
Thu, 23 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-625 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 21 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tektoncd
Tektoncd pipeline |
|
| Vendors & Products |
Tektoncd
Tektoncd pipeline |
Tue, 21 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 0.43.0 to 1.11.0, trusted resources verification policies match a resource source string (refSource.URI) against spec.resources[].pattern using regexp.MatchString. In Go, regexp.MatchString reports a match if the pattern matches anywhere in the string, so common unanchored patterns (including examples in tekton documentation) can be bypassed by attacker-controlled source strings that contain the trusted pattern as a substring. This can cause an unintended policy match and change which verification mode/keys apply. | |
| Title | Tekton Pipelines: VerificationPolicy regex pattern bypass via substring matching | |
| Weaknesses | CWE-185 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T16:48:15.671Z
Reserved: 2026-02-02T19:59:47.375Z
Link: CVE-2026-25542
Updated: 2026-04-21T16:48:11.309Z
Status : Analyzed
Published: 2026-04-21T17:16:24.213
Modified: 2026-05-01T16:33:50.630
Link: CVE-2026-25542
OpenCVE Enrichment
Updated: 2026-04-28T21:30:26Z
Github GHSA