kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 04 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 04 Jun 2025 06:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes. | |
| Weaknesses | CWE-441 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: mitre
Published: 2025-06-04T05:50:48.639Z
Updated: 2025-06-04T13:23:37.851Z
Reserved: 2025-05-23T04:16:39.433Z
Link: CVE-2025-48710
Updated: 2025-06-04T13:23:34.371Z
Status : Awaiting Analysis
Published: 2025-06-04T06:15:21.390
Modified: 2025-06-04T14:54:33.783
Link: CVE-2025-48710
No data.