Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w54x-r83c-x79q | Pepr Has Overly Permissive RBAC ClusterRole in Admin Mode |
Wed, 04 Mar 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:defenseunicorns:pepr:*:*:*:*:*:*:*:* |
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Defenseunicorns
Defenseunicorns pepr |
|
| Vendors & Products |
Defenseunicorns
Defenseunicorns pepr |
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5. | |
| Title | Pepr Overly Permissive RBAC ClusterRole in Admin Mode | |
| Weaknesses | CWE-272 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-16T21:38:59.905Z
Reserved: 2026-01-14T16:08:37.483Z
Link: CVE-2026-23634
Updated: 2026-01-16T21:38:55.935Z
Status : Analyzed
Published: 2026-01-16T20:15:49.733
Modified: 2026-03-04T14:43:21.853
Link: CVE-2026-23634
No data.
OpenCVE Enrichment
Updated: 2026-04-18T05:45:38Z
Github GHSA