Cyber Posture

CVE-2026-33211

Critical

Published: 24 March 2026

Published
24 March 2026
Modified
26 March 2026
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0003 7.1th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33211 is a critical-severity Path Traversal (CWE-22) vulnerability in Linuxfoundation Tekton Pipelines. Its CVSS base score is 9.6 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 7.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates the pathInRepo parameter to block path traversal attempts, preventing arbitrary file reads from the resolver pod's filesystem including ServiceAccount tokens.

prevent

Mandates timely flaw remediation by upgrading Tekton Pipelines to patched versions that fix the path traversal vulnerability in the git resolver.

prevent

Enforces least privilege to restrict creation of ResolutionRequests via TaskRuns or PipelineRuns to authorized entities only, limiting potential exploiters in multi-tenant environments.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Path traversal enables direct arbitrary file reads from pod filesystem (T1005), specifically to obtain credentials like ServiceAccount tokens (T1552.001) via software vulnerability exploitation (T1212).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter. A tenant…

more

with permission to create `ResolutionRequests` (e.g. by creating `TaskRuns` or `PipelineRuns` that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in `resolutionrequest.status.data`. Versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 contain a patch.

Deeper analysisAI

CVE-2026-33211 is a path traversal vulnerability (CWE-22) in the Tekton Pipelines git resolver, which provides Kubernetes-style resources for declaring CI/CD pipelines. The issue affects versions starting from 1.0.0 and prior to the patched releases 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. Exploitation occurs via the `pathInRepo` parameter, allowing unauthorized access to files outside the intended repository path.

A tenant with permissions to create `ResolutionRequests`—typically gained by initiating `TaskRuns` or `PipelineRuns` that leverage the git resolver—can exploit this flaw. Attackers achieve arbitrary file reads from the resolver pod's filesystem, including sensitive items like ServiceAccount tokens. Retrieved file contents are returned base64-encoded in the `resolutionrequest.status.data` field. The vulnerability carries a CVSS v3.1 base score of 9.6 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N), reflecting its network reach, low attack complexity, low privileges required, and potential for high confidentiality and integrity impacts across a scoped network.

Patched versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 address the issue, as implemented in the following Tekton Pipelines GitHub commits: 10fa538f9a2b6d01c75138f1ed7ba3da0e34687c, 318006c4e3a5, 3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd, 961388fcf3374bc7656d28ab58ca84987e0a75ae, and b1fee65b88aa969069c14c120045e97c37d9ee5e. Security practitioners should upgrade to these versions and review access controls for `ResolutionRequests` in multi-tenant Kubernetes environments.

Details

CWE(s)

Affected Products

linuxfoundation
tekton pipelines
1.0.0 · 1.1.0 — 1.3.3 · 1.4.0 — 1.6.1 · 1.7.0 — 1.9.2

CVEs Like This One

CVE-2026-40938Same product: Linuxfoundation Tekton Pipelines
CVE-2026-40161Same product: Linuxfoundation Tekton Pipelines
CVE-2026-27969Same vendor: Linuxfoundation
CVE-2025-59352Same vendor: Linuxfoundation
CVE-2025-51480Same vendor: Linuxfoundation
CVE-2026-35167Same vendor: Linuxfoundation
CVE-2024-53349Same vendor: Linuxfoundation
CVE-2026-33166Shared CWE-22
CVE-2026-24849Shared CWE-22
CVE-2026-23491Shared CWE-22

References