Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2025-68476

KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential
Back to all
CVE

CVE-2025-68476

KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential

Impact

An Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication.

The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount.

An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request.

The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd.

Patches

The problem has been patched in v2.17.3 and 2.18.3 as well as in main branch.

Workarounds

The only effective workaround is the strict restriction of permissions for creating and modifying TriggerAuthentication resources within the Kubernetes cluster.

Only trusted and authorized users should have create or update permissions on the TriggerAuthentication resource.

This limits an attacker's ability to configure a malicious TriggerAuthentication with an arbitrary path.

Is my project affected?

If it execute s

kubectl get deploy keda-operator -n keda -o jsonpath="{.spec.template.spec.containers[0].image}"

and the version is not 2.17.3, 2.18.3 or >= 2.19.0, that version is affected.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.2
-
4.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
C
H
U
0
-
C
H
U
6.8
-
3.1
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

Related Resources

No items found.

References

https://github.com/kedacore/keda/security/advisories/GHSA-c4p6-qg4m-9jmr, https://nvd.nist.gov/vuln/detail/CVE-2025-68476, https://github.com/kedacore/keda/commit/15c5677f65f809b9b6b59a52f4cf793db0a510fd, https://github.com/kedacore/keda

Severity

6.8

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
6.8
EPSS Probability
0.00143%
EPSS Percentile
0.34994%
Introduced Version
2.18.0,v2.17.0,v2.0.0-beta,v2.0.0-20201118092520-5c1257d8c726,v0.0.0-20200806092255-418d22634f03,v0.0.0-20200806092012-01305c868774,v1.5.0,v0.0.0-20200702081756-ecf07e937188
Fix Available
2.18.3,v2.18.3,v2.17.3,v2.0.0-20251222102055-15c5677f65f8

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading