VYPR
High severityNVD Advisory· Published Jul 27, 2023· Updated Oct 10, 2024

Crossplane vulnerable to possible image tampering from missing image validation for Packages

CVE-2023-38495

Description

Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, Crossplane's image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package. The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0. As a workaround, only use images from trusted sources and keep Package editing/creating privileges to administrators only.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Crossplane packages prior to 1.11.5, 1.12.3, and 1.13.0 lacked validation of image byte contents, allowing undetected tampering.

Vulnerability

Crossplane is a framework for building cloud-native control planes. In versions prior to 1.11.5, 1.12.3, and 1.13.0, the image backend does not validate the byte contents of Crossplane packages [1][4]. This means the software does not detect if an attacker has tampered with a Package [4].

Exploitation

An attacker who can modify a Crossplane package image (e.g., by compromising a container registry or via man-in-the-middle during image pull) could deliver a malicious package. The vulnerability does not require authentication to exploit if the attacker can interfere with image delivery. Prerequisites include access to a registry or network position to alter the package bytes [1][4].

Impact

A successful attacker could inject arbitrary content into a Crossplane package, potentially leading to arbitrary code execution within the Crossplane control plane or installation of compromised resources [1]. The impact is limited to environments where packages from untrusted sources are consumed or where package creation privileges are misconfigured [4].

Mitigation

The vulnerability is fixed in Crossplane versions 1.11.5, 1.12.3, and 1.13.0 [1][4]. Users should upgrade to these or later versions. As a workaround, administrators should only use images from trusted sources and restrict package editing/creating privileges to administrators only [1][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/crossplane/crossplaneGo
< 1.11.51.11.5
github.com/crossplane/crossplaneGo
>= 1.12.0, < 1.12.31.12.3

Affected products

9

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.