Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/defenseunicorns/pepr/releases/tag/v1.0.5 | Release Notes |
| https://github.com/defenseunicorns/pepr/security/advisories/GHSA-w54x-r83c-x79q | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-16 20:15
Updated : 2026-03-04 14:43
NVD link : CVE-2026-23634
Mitre link : CVE-2026-23634
CVE.ORG link : CVE-2026-23634
JSON object : View
Products Affected
defenseunicorns
- pepr
CWE
CWE-272
Least Privilege Violation
