← Back to CVEs
CVE-2026-28406
HIGH8.2
Description
kaniko is a tool to build container images from a Dockerfile, inside a container or Kubernetes cluster. Starting in version 1.25.4 and prior to version 1.25.10, kaniko unpacks build context archives using `filepath.Join(dest, cleanedName)` without enforcing that the final path stays within `dest`. A tar entry like `../outside.txt` escapes the extraction root and writes files outside the destination directory. In environments with registry authentication, this can be chained with docker credential helpers to achieve code execution within the executor process. Version 1.25.10 uses securejoin for path resolution in tar extraction.
CVE Details
CVSS v3.1 Score8.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/27/2026
Last Modified3/6/2026
Sourcenvd
Honeypot Sightings0
Affected Products
chainguard:kaniko
Weaknesses (CWE)
CWE-22
References
https://github.com/chainguard-forks/kaniko/commit/a370e4b1f66e6e842b685c8f70ed507964c4b221(security-advisories@github.com)
https://github.com/chainguard-forks/kaniko/pull/326(security-advisories@github.com)
https://github.com/chainguard-forks/kaniko/security/advisories/GHSA-6rxq-q92g-4rmf(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.