Medium severity5.4NVD Advisory· Published Apr 21, 2026· Updated Apr 27, 2026
CVE-2026-40923
CVE-2026-40923
Description
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Prior to 1.11.1, a validation bypass in the VolumeMount path restriction allows mounting volumes under restricted /tekton/ internal paths by using .. path traversal components. The restriction check uses strings.HasPrefix without filepath.Clean, so a path like /tekton/home/../results passes validation but resolves to /tekton/results at runtime. This vulnerability is fixed in 1.11.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/tektoncd/pipelineGo | < 1.11.1 | 1.11.1 |
Affected products
1- cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*Range: <1.11.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-rx35-6rhx-7858ghsaADVISORY
- github.com/tektoncd/pipeline/security/advisories/GHSA-rx35-6rhx-7858nvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-40923ghsaADVISORY
- github.com/tektoncd/pipeline/releases/tag/v1.11.1nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.