VYPR

Go modules package

go.etcd.io/etcd/v3

pkg:golang/go.etcd.io/etcd/v3

Vulnerabilities (8)

  • CVE-2026-44283NonMay 14, 2026
    affected >= 3.6.0, < 3.6.11fixed 3.6.11

    etcd is a distributed key-value store for the data of a distributed system. Prior to 3.4.44, 3.5.30, and 3.6.11, a vulnerability in etcd allows read access via PrevKv, or lease attachment in Put requests within transaction operations, to bypass RBAC authorization checks. An authe

  • CVE-2026-33413Mar 26, 2026
    affected >= 3.6.0-alpha.0, < 3.6.9fixed 3.6.9

    etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose the gRPC API to untrusted or parti

  • CVE-2026-33343Mar 26, 2026
    affected >= 3.6.0-alpha.0, < 3.6.9fixed 3.6.9

    etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, an authenticated user with RBAC restricted permissions on key ranges can use nested transactions to bypass all key-level authorization. This allows any authent

  • CVE-2022-34038Aug 22, 2023
    affected < 3.5.5fixed 3.5.5

    Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go. NOTE: the vendor's position is that this is not a vulnerability.

  • CVE-2021-28235Apr 4, 2023

    Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.

  • CVE-2020-15112Aug 5, 2020
    affected < 3.3.23fixed 3.3.23

    In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go do

  • CVE-2018-16886Jan 14, 2019
    affected >= 3.2.0, < 3.2.26fixed 3.2.26

    etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid R

  • CVE-2018-1098Apr 3, 2018
    affected < 3.4.0fixed 3.4.0

    A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST