Cyber Posture

CVE-2026-28406

High

Published: 27 February 2026

Published
27 February 2026
Modified
06 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
EPSS Score 0.0007 21.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may execute their own malicious payloads by hijacking the search order used to load other programs.

Security Summary

CVE-2026-28406 is a path traversal vulnerability (CWE-22) affecting kaniko, a tool for building container images from a Dockerfile within a container or Kubernetes cluster. The issue impacts versions starting from 1.25.4 up to but not including 1.25.10. Kaniko unpacks build context archives using `filepath.Join(dest, cleanedName)` without ensuring the resolved path remains within the intended destination directory, allowing malicious tar entries like `../outside.txt` to escape the extraction root and write files outside it. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L).

Attackers can exploit this vulnerability remotely with no privileges or user interaction required by supplying a malicious tar archive as the build context. This enables arbitrary file writes outside the extraction directory. In environments configured with registry authentication, the vulnerability can be chained with Docker credential helpers to achieve code execution within the kaniko executor process.

The fix in version 1.25.10 replaces the insecure path joining with securejoin for tar extraction path resolution. Relevant advisories and patches are detailed in the GitHub security advisory (GHSA-6rxq-q92g-4rmf), pull request #326, and commit a370e4b1f66e6e842b685c8f70ed507964c4b221 from the chainguard-forks/kaniko repository. Security practitioners should upgrade to 1.25.10 or later and validate build contexts from untrusted sources.

Details

CWE(s)
CWE-22

Affected Products

chainguard
kaniko
1.25.4 — 1.25.10

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1574.008 Path Interception by Search Order Hijacking Stealth
Adversaries may execute their own malicious payloads by hijacking the search order used to load other programs.
Why these techniques?

Path traversal enables remote unauthenticated exploitation of a network-accessible build tool (T1190) and arbitrary file writes to hijack credential helper execution via PATH search order (T1574.008).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References