← Back to CVEs
CVE-2025-2786
MEDIUM4.3
Description
A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This flaw allows a user with full access to their namespace to extract the ServiceAccount token and use it to submit TokenReview and SubjectAccessReview requests, potentially revealing information about other users' permissions. While this does not allow privilege escalation or impersonation, it exposes information that could aid in gathering information for further attacks.
CVE Details
CVSS v3.1 Score4.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published4/2/2025
Last Modified3/22/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-200
References
https://access.redhat.com/errata/RHSA-2025:3607(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2025:3740(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2025-2786(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2354811(secalert@redhat.com)
https://github.com/grafana/tempo-operator/pull/1145(secalert@redhat.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.