Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wjxp-xrpv-xpff | Tekton Pipelines: Git resolver API mode leaks system-configured API token to user-controlled serverURL |
Fri, 24 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation tekton Pipelines |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation tekton Pipelines |
Fri, 24 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tektoncd
Tektoncd pipeline |
|
| Vendors & Products |
Tektoncd
Tektoncd pipeline |
|
| Metrics |
ssvc
|
Tue, 21 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to 1.10.0, the Tekton Pipelines git resolver in API mode sends the system-configured Git API token to a user-controlled serverURL when the user omits the token parameter. A tenant with TaskRun or PipelineRun create permission can exfiltrate the shared API token (GitHub PAT, GitLab token, etc.) by pointing serverURL to an attacker-controlled endpoint. | |
| Title | Tekton Pipelines: Git resolver API mode leaks system-configured API token to user-controlled serverURL | |
| Weaknesses | CWE-201 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T17:41:38.895Z
Reserved: 2026-04-09T19:31:56.014Z
Link: CVE-2026-40161
Updated: 2026-04-21T17:41:34.381Z
Status : Analyzed
Published: 2026-04-21T17:16:53.790
Modified: 2026-04-24T20:55:59.183
Link: CVE-2026-40161
OpenCVE Enrichment
Updated: 2026-04-28T16:30:35Z
Github GHSA