๐Ÿ” CVE Alert

CVE-2026-34984

UNKNOWN 0.0

External Secrets Operator has DNS exfiltration via getHostByName in its v2 template engine

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Versions 2.2.0 and below contain a vulnerability in runtime/template/v2/template.go where the v2 template engine removes env and expandenv from Sprig's TxtFuncMap() but leaves the getHostByName function accessible to user-controlled templates. Since ESO executes templates within the controller process, an attacker who can create or update templated ExternalSecret resources can invoke controller-side DNS lookups using secret-derived values. This creates a DNS exfiltration primitive, allowing fetched secret material to be leaked via DNS queries without requiring direct outbound network access from the attacker's workload. The impact is a confidentiality issue, particularly in environments where untrusted or lower-trust users can author templated ExternalSecret resources and the controller has DNS resolution capability. This issue has been fixed in version 2.3.0.

CWE CWE-200
Vendor external-secrets
Product external-secrets
Published Apr 14, 2026
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for external-secrets external-secrets

Be the first to know when new unknown vulnerabilities affecting external-secrets external-secrets are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

external-secrets / external-secrets
< 2.3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/external-secrets/external-secrets/security/advisories/GHSA-r2pg-r6h7-crf3 github.com: https://github.com/external-secrets/external-secrets/commit/6800989bdc12782ca2605d3b8bf7f2876a16551a github.com: https://github.com/external-secrets/external-secrets/releases/tag/v2.3.0