<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40161 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40161/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40161/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tekton Pipelines Git Resolver API Token Leak via ServerURL Manipulation (CVE-2026-40161)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tekton-credential-leak/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tekton-credential-leak/</guid><description>Tekton Pipelines versions 1.0.0 to 1.10.0 are vulnerable to credential access, where the Git resolver in API mode transmits the system-configured Git API token to a user-controlled serverURL, enabling token exfiltration via a malicious server.</description><content:encoded><![CDATA[<p>Tekton Pipelines, a Kubernetes-style resource for declaring CI/CD pipelines, contains a vulnerability (CVE-2026-40161) in its git resolver component. Specifically, versions 1.0.0 to 1.10.0 are affected. When operating in API mode, the resolver inadvertently sends the system-configured Git API token (e.g., GitHub PAT, GitLab token) to a server specified by the user if the token parameter is omitted. This allows an attacker with TaskRun or PipelineRun creation privileges to exfiltrate the shared API token by directing the serverURL to an attacker-controlled endpoint. The vulnerability allows for the potential compromise of CI/CD pipelines and related infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a Kubernetes tenant with permissions to create TaskRun or PipelineRun resources within Tekton Pipelines.</li>
<li>The attacker crafts a malicious TaskRun or PipelineRun configuration.</li>
<li>The configuration leverages the Tekton Pipelines git resolver in API mode.</li>
<li>The attacker omits the <code>token</code> parameter in the git resolver configuration, forcing the system to use the system-configured Git API token.</li>
<li>The attacker sets the <code>serverURL</code> parameter to an attacker-controlled endpoint.</li>
<li>Tekton Pipelines, upon execution of the TaskRun or PipelineRun, sends the system-configured Git API token to the attacker-controlled <code>serverURL</code>.</li>
<li>The attacker&rsquo;s server logs and captures the leaked Git API token.</li>
<li>The attacker uses the exfiltrated token to access and potentially compromise Git repositories or other services authenticated by the token.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40161 allows an attacker to steal the system-configured Git API token used by Tekton Pipelines. This could lead to unauthorized access to Git repositories, the modification of code, and the potential compromise of the entire CI/CD pipeline. Given Tekton&rsquo;s widespread adoption, a successful attack could affect numerous organizations using the vulnerable versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tekton Pipelines to a version greater than 1.10.0 to remediate CVE-2026-40161.</li>
<li>Implement strict access controls within the Kubernetes cluster to limit TaskRun and PipelineRun creation privileges to authorized users only.</li>
<li>Monitor network traffic originating from Tekton Pipeline pods for connections to unusual or untrusted <code>serverURL</code> destinations as specified in CVE-2026-40161. Create a network connection rule for this.</li>
<li>Review Tekton Pipeline configurations for suspicious <code>serverURL</code> parameters using a file monitoring rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tekton</category><category>credential-access</category><category>cve-2026-40161</category></item></channel></rss>