Kubernetes secrets-store-csi-driver discloses service account tokens in logs
Description
Kubernetes secrets-store-csi-driver in versions before 1.3.3 discloses service account tokens in logs.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Kubernetes secrets-store-csi-driver before v1.3.3 logs service account tokens when TokenRequests is configured and log level is ≥2, allowing local access to tokens.
What the vulnerability is
The Kubernetes secrets-store-csi-driver, before version 1.3.3, improperly discloses Kubernetes service account tokens in its logs. The tokens are logged only when two conditions are met: the TokenRequests field is configured in the CSIDriver object, and the driver's log verbosity is set to level 2 or higher with the -v flag. This constitutes an information disclosure vulnerability in the driver's logging mechanism [1][4].
How it is exploited
Exploitation requires local access to the driver's logs. An attacker with access to the cluster (e.g., a pod or user with kubectl logs privileges on the secrets-store-csi-driver pods) can examine the logs and extract service account tokens. The token appears in log entries containing the string "csi.storage.k8s.io/serviceAccount.tokens". No network-based exploitation is needed; the attack vector is local (AV:L) and requires low privileges (PR:L) [1][4].
Impact
The exposed service account tokens can be exchanged with external cloud providers (such as AWS, Azure, GCP, or HashiCorp Vault) to access secrets stored in those cloud vault solutions. This could lead to unauthorized access to sensitive data managed by the secrets-store-csi-driver, with high confidentiality impact (C:H). The vulnerability does not affect integrity or availability directly [1][4].
Mitigation status
Kubernetes SIG Auth released version 1.3.3 of the secrets-store-csi-driver, which fixes the issue by ensuring service account tokens are no longer logged. Users should upgrade to v1.3.3 or later. As a temporary workaround, administrators can run the driver at log level 0 or 1 (flags -v=0 or -v=1) to prevent token logging. The advisory was published on May 25, 2023 [2][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
sigs.k8s.io/secrets-store-csi-driverGo | < 1.3.3 | 1.3.3 |
Affected products
10- osv-coords9 versionspkg:apk/chainguard/secrets-store-csi-driverpkg:apk/chainguard/secrets-store-csi-driver-crdspkg:apk/chainguard/vault-csi-providerpkg:apk/chainguard/vault-csi-provider-compatpkg:apk/wolfi/secrets-store-csi-driverpkg:apk/wolfi/secrets-store-csi-driver-crdspkg:apk/wolfi/vault-csi-providerpkg:apk/wolfi/vault-csi-provider-compatpkg:golang/sigs.k8s.io/secrets-store-csi-driver
< 1.3.3-r0+ 8 more
- (no CPE)range: < 1.3.3-r0
- (no CPE)range: < 1.3.3-r0
- (no CPE)range: < 1.4.0-r9
- (no CPE)range: < 1.4.0-r9
- (no CPE)range: < 1.3.3-r0
- (no CPE)range: < 1.3.3-r0
- (no CPE)range: < 1.4.0-r9
- (no CPE)range: < 1.4.0-r9
- (no CPE)range: < 1.3.3
- Kubernetes/secrets-store-csi-driverv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-g82w-58jf-gcxxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-2878ghsaADVISORY
- github.com/kubernetes-sigs/secrets-store-csi-driver/releases/tag/v1.3.3ghsaWEB
- github.com/kubernetes-sigs/secrets-store-csi-driver/security/advisories/GHSA-g82w-58jf-gcxxghsaWEB
- github.com/kubernetes/kubernetes/issues/118419ghsaissue-trackingWEB
- groups.google.com/g/kubernetes-security-announce/c/5K8ghQHBDdQ/m/Udee6YUgAAAJghsamailing-listWEB
- security.netapp.com/advisory/ntap-20230814-0003ghsaWEB
- security.netapp.com/advisory/ntap-20230814-0003/mitre
News mentions
0No linked articles in our index yet.