(Externally Controlled Reference to a Resource in Another Sphere), (Authorization Bypass Through User-Controlled Key) vulnerability in Apache Camel K. Authorized users in a Kubernetes namespace can create a Build resource, controlling the Pod generation in a namespace of their choice, including the operator namespace.
This issue affects Apache Camel K: from 2.0.0 before 2.8.1, from 2.9.0 before 2.9.2, from 2.10.0 before 2.10.1.
Users are recommended to upgrade to version 2.10.1 (or 2.8.1 or 2.9.2), which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 21 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 21 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | (Externally Controlled Reference to a Resource in Another Sphere), (Authorization Bypass Through User-Controlled Key) vulnerability in Apache Camel K. Authorized users in a Kubernetes namespace can create a Build resource, controlling the Pod generation in a namespace of their choice, including the operator namespace. This issue affects Apache Camel K: from 2.0.0 before 2.8.1, from 2.9.0 before 2.9.2, from 2.10.0 before 2.10.1. Users are recommended to upgrade to version 2.10.1 (or 2.8.1 or 2.9.2), which fixes the issue. | |
| Title | Apache Camel K: Camel K Cross-Namespace Build Deputy Attack | |
| Weaknesses | CWE-610 CWE-639 |
|
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-21T18:37:31.227Z
Reserved: 2026-05-13T07:38:04.636Z
Link: CVE-2026-45760
No data.
Status : Deferred
Published: 2026-05-21T13:16:19.840
Modified: 2026-05-21T19:16:53.413
Link: CVE-2026-45760
No data.
OpenCVE Enrichment
Updated: 2026-05-21T13:30:11Z