๐Ÿ” CVE Alert

CVE-2026-40109

LOW 3.1

Flux notification-controller GCR Receiver missing email validation allows unauthorized reconciliation triggering

CVSS Score
3.1
EPSS Score
0.0%
EPSS Percentile
2th

Flux notification-controller is the event forwarder and notification dispatcher for the GitOps Toolkit controllers. Prior to 1.8.3, the gcr Receiver type in Flux notification-controller does not validate the email claim of Google OIDC tokens used for Pub/Sub push authentication. This allows any valid Google-issued token, to authenticate against the Receiver webhook endpoint, triggering unauthorized Flux reconciliations. Exploitation requires the attacker to know the Receiver's webhook URL. The webhook path is generated as /hook/sha256sum(token+name+namespace), where the token is a random string stored in a Kubernetes Secret. There is no API or endpoint that enumerates webhook URLs. An attacker cannot discover the path without either having access to the cluster and permissions to read the Receiver's .status.webhookPath in the target namespace, or obtaining the URL through other means (e.g. leaked secrets or access to Pub/Sub config). Upon successful authentication, the controller triggers a reconciliation for all resources listed in the Receiver's .spec.resources. However, the practical impact is limited: Flux reconciliation is idempotent, so if the desired state in the configured sources (Git, OCI, Helm) has not changed, the reconciliation results in a no-op with no effect on cluster state. Additionally, Flux controllers deduplicate reconciliation requests, sending many requests in a short period results in only a single reconciliation being processed. This vulnerability is fixed in 1.8.3.

CWE CWE-287 CWE-345
Vendor fluxcd
Product notification-controller
Published Apr 9, 2026
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for fluxcd notification-controller

Be the first to know when new low vulnerabilities affecting fluxcd notification-controller are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Affected Versions

fluxcd / notification-controller
< 1.8.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/fluxcd/notification-controller/security/advisories/GHSA-h9cx-xjg6-5v2w github.com: https://github.com/fluxcd/notification-controller/pull/1279 github.com: https://github.com/fluxcd/notification-controller/releases/tag/v1.8.3