High severityNVD Advisory· Published Mar 16, 2026· Updated Apr 16, 2026
CVE-2026-32720
CVE-2026-32720
Description
The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). Prior to 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from a component to any other namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. This vulnerability is fixed in 0.2.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/ctfer-io/monitoringGo | < 0.2.1 | 0.2.1 |
Patches
15404a11863b3fix: remove invalid network policy (#168)
1 file changed · +0 −38
services/parts/namespace.go+0 −38 modified@@ -25,7 +25,6 @@ type ( ns *corev1.Namespace npol *netwv1.NetworkPolicy dnspol *netwv1.NetworkPolicy - internspol *netwv1.NetworkPolicy internetpol *netwv1.NetworkPolicy // Name of the namespace. Is going to be appended a 8-char random string @@ -193,43 +192,6 @@ func (ns *Namespace) provision( return } - // Whatever happens (IP ranges, DNS entries) deny all traffic to adjacent - // namespaces -> isolation by default/in depth. - ns.internspol, err = netwv1.NewNetworkPolicy(ctx, "inter-ns", &netwv1.NetworkPolicyArgs{ - Metadata: metav1.ObjectMetaArgs{ - Namespace: ns.ns.Metadata.Name(), - Labels: args.AdditionalLabels, - }, - Spec: netwv1.NetworkPolicySpecArgs{ - PodSelector: metav1.LabelSelectorArgs{}, - PolicyTypes: pulumi.ToStringArray([]string{ - "Egress", - }), - Egress: netwv1.NetworkPolicyEgressRuleArray{ - netwv1.NetworkPolicyEgressRuleArgs{ - To: netwv1.NetworkPolicyPeerArray{ - netwv1.NetworkPolicyPeerArgs{ - NamespaceSelector: metav1.LabelSelectorArgs{ - MatchExpressions: metav1.LabelSelectorRequirementArray{ - metav1.LabelSelectorRequirementArgs{ - Key: pulumi.String("kubernetes.io/metadata.name"), - Operator: pulumi.String("NotIn"), - Values: pulumi.StringArray{ - ns.ns.Metadata.Name().Elem(), - }, - }, - }, - }, - }, - }, - }, - }, - }, - }, opts...) - if err != nil { - return - } - // For dependencies resolution and the use of external services, grant // access to internet, i.e. all IP ranges except private ones // (https://en.wikipedia.org/wiki/Private_network#Private_IPv4_addresses).
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-7x23-j8gv-v54xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-32720ghsaADVISORY
- github.com/ctfer-io/monitoring/commit/5404a11863b32b14ee5c62d1215352ab519d4edbghsaWEB
- github.com/ctfer-io/monitoring/pull/168ghsaWEB
- github.com/ctfer-io/monitoring/releases/tag/v0.2.1ghsaWEB
- github.com/ctfer-io/monitoring/security/advisories/GHSA-7x23-j8gv-v54xnvdWEB
News mentions
0No linked articles in our index yet.