CVE-2026-28406

Kaniko Project · Kaniko

A high-severity vulnerability in Kaniko, a container image builder, could allow attackers to compromise build environments within Kubernetes clusters.

Executive summary

Kaniko is affected by a high-severity vulnerability that could allow for the compromise of container build processes, potentially leading to supply chain attacks.

Vulnerability

Kaniko, which builds container images from Dockerfiles inside Kubernetes clusters, contains a flaw with a CVSS score of 8.2. This suggests a vulnerability that could allow an attacker to escape the build container or inject malicious code into resulting images.

Business impact

A vulnerability in a build tool like Kaniko presents a significant supply chain risk. Attackers could potentially modify container images during the build process, leading to the deployment of backdoored software across the entire enterprise infrastructure. The high CVSS score justifies urgent attention to prevent unauthorized access to the cluster environment.

Remediation

Immediate Action: Update Kaniko to the latest version as specified in the project's security advisory and rebuild any images created during the potential window of vulnerability.

Proactive Monitoring: Audit Kubernetes audit logs for unusual pod behavior associated with Kaniko build jobs and monitor container registries for unauthorized image modifications.

Compensating Controls: Implement strict Pod Security Policies or Admission Controllers to limit the privileges of Kaniko build pods, following the principle of least privilege.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The security of the container build pipeline is paramount. Organizations using Kaniko within their CI/CD pipelines must apply vendor-provided security updates immediately to ensure the integrity of their container images and the safety of their Kubernetes clusters.