Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cpfq-66p2-336j | Consul is vulnerable to arbitrary file read when configured with Kubernetes authentication |
Fri, 13 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 12 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hashicorp
Hashicorp consul Hashicorp consul Enterprise |
|
| Vendors & Products |
Hashicorp
Hashicorp consul Hashicorp consul Enterprise |
Wed, 11 Mar 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vulnerable to arbitrary file read when configured with Kubernetes authentication. This vulnerability, CVE-2026-2808, is fixed in Consul 1.18.21, 1.21.11 and 1.22.5. | |
| Title | Consul vulnerable to arbitrary file reads through the vault kubernetes authentication provider | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HashiCorp
Published:
Updated: 2026-04-17T17:57:55.646Z
Reserved: 2026-02-19T15:17:24.550Z
Link: CVE-2026-2808
Updated: 2026-03-12T13:28:22.607Z
Status : Awaiting Analysis
Published: 2026-03-12T00:16:11.770
Modified: 2026-03-12T21:07:53.427
Link: CVE-2026-2808
OpenCVE Enrichment
Updated: 2026-03-20T15:36:38Z
Github GHSA