Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5.
Metrics
Affected Vendors & Products
References
History
Fri, 16 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5. | |
| Title | Pepr Overly Permissive RBAC ClusterRole in Admin Mode | |
| Weaknesses | CWE-272 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-16T21:38:59.905Z
Reserved: 2026-01-14T16:08:37.483Z
Link: CVE-2026-23634
No data.
Status : Received
Published: 2026-01-16T20:15:49.733
Modified: 2026-01-16T20:15:49.733
Link: CVE-2026-23634
No data.
OpenCVE Enrichment
No data.