← Back to CVEs
CVE-2026-32768
CRITICAL9.9
Description
Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. In versions prior to 0.6.5, due to a miswritten NetworkPolicy, a malicious actor can pivot from an instance to any Pod out of the origin namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. In the specific case of sdk/kubernetes.Kompose it does not isolate the instances. This issue has been fixed in version 0.6.5.
CVE Details
CVSS v3.1 Score9.9
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/20/2026
Last Modified4/8/2026
Sourcenvd
Honeypot Sightings0
Affected Products
ctfer-io:chall-manager
Weaknesses (CWE)
CWE-284
References
https://github.com/ctfer-io/chall-manager/commit/dc5ef27dfed2befef7f506ab8ca14d062b0d79c5(security-advisories@github.com)
https://github.com/ctfer-io/chall-manager/releases/tag/v0.6.5(security-advisories@github.com)
https://github.com/ctfer-io/chall-manager/security/advisories/GHSA-mw24-f3xh-j3qv(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.