<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Spinnaker — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/spinnaker/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 14:46:46 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/spinnaker/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical RCE Vulnerabilities in Spinnaker</title><link>https://feed.craftedsignal.io/briefs/2026-04-spinnaker-rce/</link><pubDate>Wed, 22 Apr 2026 14:46:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spinnaker-rce/</guid><description>Critical vulnerabilities CVE-2026-32613 and CVE-2026-32604 in Spinnaker allow authenticated attackers to execute arbitrary code due to insufficient input validation in expression parsing and gitrepo artifact handling, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>Two critical remote code execution (RCE) vulnerabilities, CVE-2026-32613 and CVE-2026-32604, have been discovered in Spinnaker, an open-source multi-cloud continuous delivery platform. These vulnerabilities stem from insufficient input validation and sanitization. CVE-2026-32613 relates to expression parsing, allowing for the execution of malicious expressions via untrusted input in pipeline expressions. CVE-2026-32604 arises from improper handling of gitrepo artifact types, specifically regarding the sanitization of user-controlled input like branch names and file paths. An attacker with pipeline configuration access can exploit these flaws to achieve arbitrary code execution on the affected system. The Centre for Cybersecurity Belgium (CCB) strongly advises immediate patching and enhanced monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to Spinnaker pipeline configuration, either through compromised credentials or exploiting a separate authentication vulnerability.</li>
<li>For CVE-2026-32613, the attacker injects a malicious expression into a pipeline configuration, leveraging the insufficient input validation in expression parsing.</li>
<li>For CVE-2026-32604, the attacker crafts a malicious gitrepo artifact definition within a Spinnaker pipeline, specifying a branch name or file path containing injected code.</li>
<li>The Spinnaker pipeline is triggered, either manually or automatically based on configured triggers.</li>
<li>During pipeline execution, the malicious expression (CVE-2026-32613) or gitrepo artifact (CVE-2026-32604) is processed.</li>
<li>The injected code is executed within the context of the Spinnaker service, gaining the privileges of the Spinnaker process.</li>
<li>The attacker leverages the code execution to establish persistence, move laterally within the network, or exfiltrate sensitive data.</li>
<li>The final objective is achieved, such as complete system compromise, data breach, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32613 or CVE-2026-32604 allows an attacker to execute arbitrary code on the Spinnaker server, potentially leading to complete system compromise. This could result in the theft of sensitive credentials, modification of deployment pipelines, deployment of malicious code to production environments, and disruption of critical services. Given Spinnaker&rsquo;s role in continuous delivery, a successful attack can have a wide-ranging impact on the organization&rsquo;s software development lifecycle.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Spinnaker to the latest version to remediate CVE-2026-32613 and CVE-2026-32604 as recommended by the CCB.</li>
<li>Upscale monitoring and detection capabilities to identify any suspicious activity related to these vulnerabilities, as suggested by the CCB.</li>
<li>Implement strict input validation and sanitization measures for all user-controlled input within Spinnaker pipeline configurations to prevent future exploitation of similar vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>spinnaker</category></item></channel></rss>