Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-99j8-wv67-4c72 | Aiven Operator has cross-namespace secret exfiltration via ClickhouseUser connInfoSecretSource |
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aiven aiven Operator
|
|
| CPEs | cpe:2.3:a:aiven:aiven_operator:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aiven aiven Operator
|
Fri, 10 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aiven
Aiven aiven-operator |
|
| Vendors & Products |
Aiven
Aiven aiven-operator |
Thu, 09 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Aiven Operator allows you to provision and manage Aiven Services from your Kubernetes cluster. From 0.31.0 to before 0.37.0, a developer with create permission on ClickhouseUser CRDs in their own namespace can exfiltrate secrets from any other namespace — production database credentials, API keys, service tokens — with a single kubectl apply. The operator reads the victim's secret using its ClusterRole and writes the password into a new secret in the attacker's namespace. The operator acts as a confused deputy: its ServiceAccount has cluster-wide secret read/write (aiven-operator-role ClusterRole), and it trusts user-supplied namespace values in spec.connInfoSecretSource.namespace without validation. No admission webhook enforces this boundary — the ServiceUser webhook returns nil, and no ClickhouseUser webhook exists. This vulnerability is fixed in 0.37.0. | |
| Title | Aiven Operator has cross-namespace secret exfiltration via ClickhouseUser connInfoSecretSource | |
| Weaknesses | CWE-269 CWE-441 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-10T14:08:22.087Z
Reserved: 2026-04-07T22:40:33.822Z
Link: CVE-2026-39961
Updated: 2026-04-10T14:08:16.792Z
Status : Analyzed
Published: 2026-04-09T18:17:02.053
Modified: 2026-05-13T16:06:00.737
Link: CVE-2026-39961
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:31:58Z
Github GHSA