๐Ÿ” CVE Alert

CVE-2026-28406

HIGH 8.2

kaniko has tar archive path traversal in build context extraction allows writing files outside destination directory

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

kaniko is a tool to build container images from a Dockerfile, inside a container or Kubernetes cluster. Starting in version 1.25.4 and prior to version 1.25.10, kaniko unpacks build context archives using `filepath.Join(dest, cleanedName)` without enforcing that the final path stays within `dest`. A tar entry like `../outside.txt` escapes the extraction root and writes files outside the destination directory. In environments with registry authentication, this can be chained with docker credential helpers to achieve code execution within the executor process. Version 1.25.10 uses securejoin for path resolution in tar extraction.

CWE CWE-22
Vendor chainguard-forks
Product kaniko
Published Feb 27, 2026
Last Updated Mar 2, 2026
Stay Ahead of the Next One

Get instant alerts for chainguard-forks kaniko

Be the first to know when new high vulnerabilities affecting chainguard-forks kaniko are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low

Affected Versions

chainguard-forks / kaniko
>= 1.25.4, < 1.25.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/chainguard-forks/kaniko/security/advisories/GHSA-6rxq-q92g-4rmf github.com: https://github.com/chainguard-forks/kaniko/pull/326 github.com: https://github.com/chainguard-forks/kaniko/commit/a370e4b1f66e6e842b685c8f70ed507964c4b221