Crossplane vulnerable to possible image tampering from missing image validation for Packages
Description
Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, Crossplane's image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package. The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0. As a workaround, only use images from trusted sources and keep Package editing/creating privileges to administrators only.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Crossplane packages prior to 1.11.5, 1.12.3, and 1.13.0 lacked validation of image byte contents, allowing undetected tampering.
Vulnerability
Crossplane is a framework for building cloud-native control planes. In versions prior to 1.11.5, 1.12.3, and 1.13.0, the image backend does not validate the byte contents of Crossplane packages [1][4]. This means the software does not detect if an attacker has tampered with a Package [4].
Exploitation
An attacker who can modify a Crossplane package image (e.g., by compromising a container registry or via man-in-the-middle during image pull) could deliver a malicious package. The vulnerability does not require authentication to exploit if the attacker can interfere with image delivery. Prerequisites include access to a registry or network position to alter the package bytes [1][4].
Impact
A successful attacker could inject arbitrary content into a Crossplane package, potentially leading to arbitrary code execution within the Crossplane control plane or installation of compromised resources [1]. The impact is limited to environments where packages from untrusted sources are consumed or where package creation privileges are misconfigured [4].
Mitigation
The vulnerability is fixed in Crossplane versions 1.11.5, 1.12.3, and 1.13.0 [1][4]. Users should upgrade to these or later versions. As a workaround, administrators should only use images from trusted sources and restrict package editing/creating privileges to administrators only [1][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/crossplane/crossplaneGo | < 1.11.5 | 1.11.5 |
github.com/crossplane/crossplaneGo | >= 1.12.0, < 1.12.3 | 1.12.3 |
Affected products
9- osv-coords8 versionspkg:apk/chainguard/crossplanepkg:apk/chainguard/crossplane-crankpkg:apk/chainguard/crossplane-xfnpkg:apk/wolfi/crossplanepkg:apk/wolfi/crossplane-crankpkg:apk/wolfi/crossplane-xfnpkg:bitnami/crossplanepkg:golang/github.com/crossplane/crossplane
< 0+ 7 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 1.11.5
- (no CPE)range: < 1.11.5
- crossplane/crossplanev5Range: < 1.11.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-pj4x-2xr5-w87mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-38495ghsaADVISORY
- github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdfghsax_refsource_MISCWEB
- github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87mghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.