Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
To mitigate this vulnerability, upgrade Kubernetes or enable the CSIMigrationPortworx feature gate.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r6j8-c6r2-37rr | kube-controller-manager is vulnerable to half-blind Server Side Request Forgery through in-tree Portworx StorageClass |
Tue, 16 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 15 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kubernetes
Kubernetes kubernetes |
|
| Vendors & Products |
Kubernetes
Kubernetes kubernetes |
Sun, 14 Dec 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services). | |
| Title | Portworx Half-Blind SSRF in kube-controller-manager | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: kubernetes
Published:
Updated: 2025-12-15T16:26:59.485Z
Reserved: 2025-11-16T20:53:36.588Z
Link: CVE-2025-13281
Updated: 2025-12-14T22:05:27.154Z
Status : Deferred
Published: 2025-12-14T22:15:36.450
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-13281
OpenCVE Enrichment
Updated: 2025-12-15T14:05:53Z
Github GHSA