Description
Aiven Operator allows you to provision and manage Aiven Services from your Kubernetes cluster. From 0.31.0 to before 0.37.0, a developer with create permission on ClickhouseUser CRDs in their own namespace can exfiltrate secrets from any other namespace — production database credentials, API keys, service tokens — with a single kubectl apply. The operator reads the victim's secret using its ClusterRole and writes the password into a new secret in the attacker's namespace. The operator acts as a confused deputy: its ServiceAccount has cluster-wide secret read/write (aiven-operator-role ClusterRole), and it trusts user-supplied namespace values in spec.connInfoSecretSource.namespace without validation. No admission webhook enforces this boundary — the ServiceUser webhook returns nil, and no ClickhouseUser webhook exists. This vulnerability is fixed in 0.37.0.
Published: 2026-04-09
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Secret exfiltration across namespaces
Action: Immediate Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-99j8-wv67-4c72 Aiven Operator has cross-namespace secret exfiltration via ClickhouseUser connInfoSecretSource
History

Wed, 13 May 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Aiven aiven Operator
CPEs cpe:2.3:a:aiven:aiven_operator:*:*:*:*:*:*:*:*
Vendors & Products Aiven aiven Operator

Fri, 10 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Aiven
Aiven aiven-operator
Vendors & Products Aiven
Aiven aiven-operator

Thu, 09 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Aiven Operator allows you to provision and manage Aiven Services from your Kubernetes cluster. From 0.31.0 to before 0.37.0, a developer with create permission on ClickhouseUser CRDs in their own namespace can exfiltrate secrets from any other namespace — production database credentials, API keys, service tokens — with a single kubectl apply. The operator reads the victim's secret using its ClusterRole and writes the password into a new secret in the attacker's namespace. The operator acts as a confused deputy: its ServiceAccount has cluster-wide secret read/write (aiven-operator-role ClusterRole), and it trusts user-supplied namespace values in spec.connInfoSecretSource.namespace without validation. No admission webhook enforces this boundary — the ServiceUser webhook returns nil, and no ClickhouseUser webhook exists. This vulnerability is fixed in 0.37.0.
Title Aiven Operator has cross-namespace secret exfiltration via ClickhouseUser connInfoSecretSource
Weaknesses CWE-269
CWE-441
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Aiven Aiven-operator Aiven Operator
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-10T14:08:22.087Z

Reserved: 2026-04-07T22:40:33.822Z

Link: CVE-2026-39961

cve-icon Vulnrichment

Updated: 2026-04-10T14:08:16.792Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T18:17:02.053

Modified: 2026-05-13T16:06:00.737

Link: CVE-2026-39961

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:31:58Z

Weaknesses