Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mw24-f3xh-j3qv | Chall-Manager's invalid NetworkPolicy enables a malicious actor to pivot into another namespace |
Wed, 08 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ctfer-io:chall-manager:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ctfer-io
Ctfer-io chall-manager |
|
| Vendors & Products |
Ctfer-io
Ctfer-io chall-manager |
Fri, 20 Mar 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. In versions prior to 0.6.5, due to a miswritten NetworkPolicy, a malicious actor can pivot from an instance to any Pod out of the origin namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. In the specific case of sdk/kubernetes.Kompose it does not isolate the instances. This issue has been fixed in version 0.6.5. | |
| Title | Chall-Manager's invalid NetworkPolicy enables a malicious actor to pivot into another namespace | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T15:58:42.743Z
Reserved: 2026-03-13T18:53:03.534Z
Link: CVE-2026-32768
Updated: 2026-03-20T15:58:37.611Z
Status : Analyzed
Published: 2026-03-20T06:16:09.937
Modified: 2026-04-08T20:49:11.647
Link: CVE-2026-32768
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:29:40Z
Github GHSA