High severity7.7NVD Advisory· Published Apr 21, 2026· Updated Apr 24, 2026
CVE-2026-40161
CVE-2026-40161
Description
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to 1.10.0, the Tekton Pipelines git resolver in API mode sends the system-configured Git API token to a user-controlled serverURL when the user omits the token parameter. A tenant with TaskRun or PipelineRun create permission can exfiltrate the shared API token (GitHub PAT, GitLab token, etc.) by pointing serverURL to an attacker-controlled endpoint.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/tektoncd/pipelineGo | >= 1.0.0, <= 1.10.0 | — |
Affected products
1- cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*Range: >=1.0.0,<=1.10.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-wjxp-xrpv-xpffghsaADVISORY
- github.com/tektoncd/pipeline/security/advisories/GHSA-wjxp-xrpv-xpffnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-40161ghsaADVISORY
- github.com/tektoncd/pipeline/issues/9608nvdIssue TrackingWEB
- github.com/tektoncd/pipeline/issues/9609nvdIssue TrackingWEB
News mentions
0No linked articles in our index yet.