| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x3j7-7pgj-h87r | Spinnaker: RCE when using gitrepo artifact types due to improper sanitization of user input on branch and paths |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spinnaker
Spinnaker spinnaker |
|
| Vendors & Products |
Spinnaker
Spinnaker spinnaker |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Spinnaker is an open source, multi-cloud continuous delivery platform. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, a bad actor can execute arbitrary commands very simply on the clouddriver pods. This can expose credentials, remove files, or inject resources easily. Versions 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 contain a patch. As a workaround, disable the gitrepo artifact types. | |
| Title | Spinnaker vulnerable to RCE when using gitrepo artifact types due to improper sanitization of user input on branch and paths | |
| Weaknesses | CWE-20 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T03:56:17.486Z
Reserved: 2026-03-12T14:54:24.270Z
Link: CVE-2026-32604
Updated: 2026-04-21T17:36:52.187Z
Status : Awaiting Analysis
Published: 2026-04-20T21:16:32.457
Modified: 2026-04-21T16:20:24.180
Link: CVE-2026-32604
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:47:16Z
Github GHSA