Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 0.43.0 to 1.11.0, trusted resources verification policies match a resource source string (refSource.URI) against spec.resources[].pattern using regexp.MatchString. In Go, regexp.MatchString reports a match if the pattern matches anywhere in the string, so common unanchored patterns (including examples in tekton documentation) can be bypassed by attacker-controlled source strings that contain the trusted pattern as a substring. This can cause an unintended policy match and change which verification mode/keys apply.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tektoncd
Tektoncd pipeline |
|
| Vendors & Products |
Tektoncd
Tektoncd pipeline |
Tue, 21 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 0.43.0 to 1.11.0, trusted resources verification policies match a resource source string (refSource.URI) against spec.resources[].pattern using regexp.MatchString. In Go, regexp.MatchString reports a match if the pattern matches anywhere in the string, so common unanchored patterns (including examples in tekton documentation) can be bypassed by attacker-controlled source strings that contain the trusted pattern as a substring. This can cause an unintended policy match and change which verification mode/keys apply. | |
| Title | Tekton Pipelines: VerificationPolicy regex pattern bypass via substring matching | |
| Weaknesses | CWE-185 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T16:48:15.671Z
Reserved: 2026-02-02T19:59:47.375Z
Link: CVE-2026-25542
Updated: 2026-04-21T16:48:11.309Z
Status : Received
Published: 2026-04-21T17:16:24.213
Modified: 2026-04-21T17:16:24.213
Link: CVE-2026-25542
No data.
OpenCVE Enrichment
Updated: 2026-04-21T17:30:37Z