CVE-2025-59823

Project · Project Gardener implements the automated management and operation of Kubernetes clusters as a Multiple Products

A critical severity code injection vulnerability has been discovered in Project Gardener's Extensions for AWS providers.

Executive summary

A critical severity code injection vulnerability has been discovered in Project Gardener's Extensions for AWS providers. Successful exploitation of this flaw could allow an unauthenticated attacker to inject and execute arbitrary code, leading to a complete compromise of the Kubernetes clusters managed by the platform and the underlying cloud infrastructure. Due to the critical nature and high CVSS score, immediate remediation is strongly advised to prevent potential data breaches, service disruption, and unauthorized access to cloud resources.

Vulnerability

This vulnerability is a code injection flaw within the Gardener Extensions for AWS providers. An attacker can exploit this by sending specially crafted data to a vulnerable component responsible for managing AWS resources. The system fails to properly sanitize this input, allowing the attacker's malicious code to be executed with the privileges of the Gardener management service. This could grant the attacker the ability to manipulate Kubernetes cluster configurations, access or exfiltrate data from running applications, and create, modify, or delete underlying AWS infrastructure components.

Business impact

This vulnerability presents a critical risk to the organization, reflected by its CVSS score of 9.9. Exploitation could lead to a complete compromise of the Kubernetes-as-a-service environment. The potential consequences include the exfiltration of sensitive company and customer data, deployment of ransomware or cryptomining malware, widespread service outages, and significant financial loss from fraudulent use of cloud resources. A successful attack would also cause severe reputational damage and could allow an attacker to pivot from the compromised cluster into the broader corporate cloud environment.

Remediation

Immediate Action: Organizations must immediately upgrade the affected components to the latest secure version. Specifically, update the Gardener Extensions for AWS providers to version 1.64.0 or later, as recommended by the vendor. After patching, it is crucial to monitor for any signs of post-remediation exploitation attempts and thoroughly review historical access and audit logs for indicators of compromise.

Proactive Monitoring: Implement enhanced monitoring on the Gardener control plane and associated AWS accounts. Security teams should look for unusual or unauthorized API calls to AWS services (e.g., IAM, EC2, S3), unexpected modifications to security groups or IAM roles, and anomalous container or pod behavior within the managed Kubernetes clusters. Reviewing Gardener audit logs for suspicious configuration changes is also recommended.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict network access to the Gardener management endpoints to only trusted IP ranges. Apply the principle of least privilege to the IAM roles used by Gardener, limiting their permissions to only what is absolutely necessary. Consider deploying a Web Application Firewall (WAF) to inspect and filter traffic for patterns associated with code injection attacks.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.9, this vulnerability represents an immediate and severe threat to any organization using the affected Gardener products. We strongly recommend that all affected systems be patched immediately without delay. Although there is no evidence of active exploitation at this time, the high potential for impact makes this a prime target for attackers. Prioritize the deployment of the vendor-supplied update and implement the recommended monitoring controls to ensure the integrity of your cloud and Kubernetes environments.