kubeflow-pipelines vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kubeflow-pipelines package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Server-Side Request Forgery (SSRF)

<2.16.0-r0
  • L
GHSA-p8p7-x288-28g6

<2.16.0-r0
  • L
GHSA-3ppc-4f35-3m26

<2.16.0-r0
  • H
Inefficient Regular Expression Complexity

<2.16.0-r0
  • L
Improper Initialization

<2.15.0-r13
  • L
GHSA-fw7p-63qq-7hpr

<2.15.0-r13
  • L
GHSA-w7fw-mjwx-w883

<2.15.0-r12
  • L
GHSA-2g4f-4pwh-qvx6

<2.15.0-r12
  • M
Improper Handling of Unicode Encoding

<2.15.0-r12
  • L
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<2.15.0-r12
  • L
Directory Traversal

<2.15.0-r12
  • L
GHSA-r6q2-hw4h-h46w

<2.15.0-r12
  • L
Inefficient Regular Expression Complexity

<2.15.0-r12
  • L
GHSA-83g3-92jg-28cx

<2.15.0-r12
  • L
GHSA-jmr7-xgp7-cmfj

<2.15.0-r12
  • L
GHSA-6rw7-vpxm-498p

<2.15.0-r12
  • L
GHSA-r6ph-v2qm-q3c2

<2.15.0-r12
  • L
GHSA-34x7-hfp2-rc4v

<2.15.0-r12
  • H
Directory Traversal

<2.15.0-r12
  • L
CVE-2025-15284

<2.15.0-r12
  • H
CVE-2026-2391

<2.15.0-r12
  • M
CVE-2026-26007

<2.15.0-r12
  • L
CVE-2025-61732

<2.15.0-r11
  • C
CVE-2025-68121

<2.15.0-r11
  • L
GHSA-h355-32pf-p2xm

<2.15.0-r11
  • L
GHSA-8jvr-vh7g-f8gx

<2.15.0-r11
  • L
Improper Input Validation

<2.15.0-r10
  • L
Allocation of Resources Without Limits or Throttling

<2.15.0-r9
  • L
GHSA-37qj-frw5-hhjh

<2.15.0-r10
  • L
GHSA-8qq5-rm4j-mr97

<2.15.0-r10
  • L
GHSA-63vm-454h-vhhq

<2.15.0-r9
  • M
Cross-site Scripting (XSS)

<2.15.0-r8
  • L
GHSA-cv78-6m8q-ph82

<2.15.0-r8
  • M
Directory Traversal

<2.15.0-r10
  • L
Allocation of Resources Without Limits or Throttling

<2.15.0-r7
  • L
GHSA-gr56-3gp6-6gmj

<2.15.0-r7
  • L
Allocation of Resources Without Limits or Throttling

<2.15.0-r7
  • L
GHSA-xvqr-69v8-f3gv

<2.15.0-r7
  • L
GHSA-xxjr-mmjv-4gpg

<2.15.0-r7
  • L
GHSA-cm6p-qc7v-m3jw

<2.15.0-r7
  • M
CVE-2025-13465

<2.15.0-r7
  • L
GHSA-gm9r-q53w-2gh4

<2.15.0-r7
  • L
Out-of-bounds Write

<2.15.0-r7
  • L
GHSA-g9q4-qjx4-2v7q

<2.15.0-r7
  • L
CVE-2025-61731

<2.15.0-r7
  • L
CVE-2025-61730

<2.15.0-r7
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<2.15.0-r6
  • L
GHSA-38jv-5279-wg99

<2.15.0-r6
  • L
CVE-2025-7783

<2.15.0-r1
  • L
GHSA-hcg3-q754-cr77

<2.4.0-r5
  • L
GHSA-4www-5p9h-95mh

<2.14.3-r3
  • L
GHSA-c7qv-q95q-8v27

<2.15.0-r1
  • L
GHSA-cfpf-hrx2-8rv6

<2.15.0-r5
  • M
CVE-2024-4067

<2.15.0-r1
  • L
CVE-2024-4068

<2.15.0-r1
  • M
CVE-2025-32997

<2.14.3-r3
  • L
Allocation of Resources Without Limits or Throttling

<2.15.0-r5
  • L
GHSA-hw8r-x6gr-5gjp

<2.15.0-r1
  • L
GHSA-9gqv-wp59-fq42

<2.14.3-r3
  • L
GHSA-6v2p-p543-phr9

<2.4.0-r6
  • L
CVE-2025-1302

<2.15.0-r1
  • L
GHSA-fjxv-7rqg-78g4

<2.15.0-r1
  • L
CVE-2024-21534

<2.15.0-r1
  • M
CVE-2025-4565

<2.15.0-r1
  • L
GHSA-952p-6rrq-rcjv

<2.15.0-r1
  • L
GHSA-pppg-cpfq-h7wr

<2.15.0-r1
  • L
GHSA-8qvm-5x2c-j2w7

<2.15.0-r1
  • M
CVE-2025-32996

<2.14.3-r3
  • H
CVE-2024-21536

<2.15.0-r1
  • L
GHSA-grv7-fg5c-xmjg

<2.15.0-r1
  • H
Allocation of Resources Without Limits or Throttling

<2.15.0-r4
  • L
GHSA-gm62-xv2j-4w53

<2.15.0-r4
  • L
GHSA-2xpw-w6gg-jr37

<2.15.0-r4
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<2.15.0-r4
  • L
GHSA-869p-cjfg-cm3x

<2.15.0-r2
  • L
Improper Certificate Validation

<2.15.0-r2
  • L
Improper Verification of Cryptographic Signature

<2.15.0-r2
  • L
GHSA-7c64-f9jr-v9h2

<2.15.0-r2
  • L
GHSA-5mh9-3jwc-rp59

<2.15.0-r2
  • L
Improper Certificate Validation

<2.15.0-r2
  • H
Link Following

<2.15.0-r3
  • L
GHSA-xrqc-7xgx-c9vh

<2.15.0-r3
  • M
Integer Overflow or Wraparound

<2.15.0-r0
  • L
CVE-2025-12816

<2.15.0-r0
  • L
GHSA-554w-wpv2-vw27

<2.15.0-r0
  • L
GHSA-65ch-62r8-g69g

<2.15.0-r0
  • L
GHSA-5gfm-wpxj-wjgq

<2.15.0-r0
  • H
Uncontrolled Recursion

<2.15.0-r0
  • L
CVE-2025-47914

<2.14.4-r1
  • L
GHSA-mh29-5h37-fv8m

<2.14.4-r1
  • L
CVE-2025-58181

<2.14.4-r1
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<2.14.4-r1
  • L
GHSA-j5w8-q4qc-rx2x

<2.14.4-r1
  • L
GHSA-f6x5-jh6r-wrfv

<2.14.4-r1
  • L
GHSA-p84v-gxvw-73pf

<2.14.3-r3
  • L
GHSA-c2hv-4pfj-mm2r

<2.14.3-r3
  • H
Directory Traversal

<2.14.3-r3
  • M
Insufficiently Protected Credentials

<2.14.3-r3
  • L
Allocation of Resources Without Limits or Throttling

<2.14.3-r1
  • L
GHSA-4hjh-wcwx-xvwj

<2.14.3-r1
  • L
GHSA-48p4-8xcf-vxj5

<2.5.0-r4
  • L
GHSA-pq67-6m6q-mj2v

<2.5.0-r4
  • M
Open Redirect

<2.5.0-r4
  • M
Open Redirect

<2.5.0-r4
  • L
Resource Exhaustion

<2.5.0-r3
  • L
GHSA-v6h2-p8h4-qcjw

<2.5.0-r3
  • L
CVE-2024-29041

<2.4.0-r9
  • L
GHSA-pxg6-pf52-xh8x

<2.4.0-r9
  • L
GHSA-rv95-896h-c2vc

<2.4.0-r9
  • L
GHSA-93mq-9ffx-83m2

<2.4.0-r9
  • L
CVE-2024-47764

<2.4.0-r9
  • L
Allocation of Resources Without Limits or Throttling

<2.4.0-r9
  • L
GHSA-qxp5-gwg8-xv66

<2.4.0-r8
  • L
CVE-2025-22870

<2.4.0-r8
  • L
GHSA-gxpj-cx7g-858c

<2.4.0-r7
  • M
Resource Exhaustion

<2.4.0-r7
  • L
CVE-2025-22868

<2.4.0-r6
  • L
GHSA-jr5f-v2jv-69x6

<2.4.0-r5
  • L
CVE-2025-22869

<2.4.0-r5
  • M
Server-Side Request Forgery (SSRF)

<2.4.0-r5
  • L
GHSA-79v4-65xg-pq4g

<2.4.0-r4
  • L
CVE-2024-12797

<2.4.0-r4
  • L
CVE-2025-22866

<2.4.0-r3
  • L
GHSA-3whm-j4xm-rv8x

<2.4.0-r3
  • L
GHSA-6wxm-mpqj-6jpf

<2.4.0-r2
  • L
CVE-2024-45339

<2.4.0-r2
  • L
GHSA-w32m-9786-jp63

<2.3.0-r5
  • L
CVE-2024-45338

<2.3.0-r5
  • L
GHSA-v778-237x-gjrc

<2.3.0-r4
  • L
CVE-2024-45337

<2.3.0-r4
  • L
CVE-2024-10220

<2.3.0-r3
  • L
GHSA-27wf-5967-98gx

<2.3.0-r3
  • L
Inefficient Regular Expression Complexity

<2.3.0-r3
  • L
GHSA-rhx6-c78j-4q9w

<2.3.0-r3
  • L
GHSA-qwcr-r2fm-qrc7

<2.2.0-r12
  • L
GHSA-j7vj-rw65-4v26

<2.2.0-r12
  • L
GHSA-crqm-pwhx-j97f

<2.2.0-r12
  • L
GHSA-qw6h-vgh9-j6wx

<2.2.0-r12
  • M
Cross-site Scripting (XSS)

<2.2.0-r12
  • L
GHSA-8xfx-rj4p-23jm

<2.2.0-r12
  • L
GHSA-m6fv-jmcg-4jfg

<2.2.0-r12
  • L
GHSA-cm22-4g7w-348p

<2.2.0-r12
  • L
GHSA-9wv6-86v2-598j

<2.2.0-r12
  • H
CVE-2024-45590

<2.2.0-r12
  • M
Cross-site Scripting (XSS)

<2.2.0-r12
  • L
CVE-2024-34158

<2.2.0-r12
  • L
Inefficient Regular Expression Complexity

<2.2.0-r12
  • L
CVE-2024-34156

<2.2.0-r12
  • M
Cross-site Scripting (XSS)

<2.2.0-r12
  • L
CVE-2024-34155

<2.2.0-r12
  • H
Server-Side Request Forgery (SSRF)

<2.2.0-r10
  • L
GHSA-8hc4-vh64-cxmj

<2.2.0-r10
  • H
Resource Exhaustion

<2.2.0-r9
  • L
GHSA-mpg4-rc92-vx8v

<2.2.0-r9
  • L
CVE-2024-5321

<2.2.0-r8
  • L
GHSA-82m2-cv7p-4m75

<2.2.0-r8
  • L
GHSA-jfmj-5v4g-7637

<2.2.0-r7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.0-r7
  • L
GHSA-248v-346w-9cwc

<2.2.0-r6
  • H
Insufficient Verification of Data Authenticity

<2.2.0-r6
  • L
CVE-2024-24791

<2.2.0-r5
  • L
GHSA-hw49-2p59-3mhj

<2.2.0-r5
  • L
GHSA-3h5v-q93c-6h6q

<2.2.0-r4
  • L
CVE-2024-37890

<2.2.0-r4
  • L
GHSA-34jh-p97f-mpxf

<2.2.0-r4
  • M
CVE-2024-37891

<2.2.0-r4
  • L
GHSA-8cfg-vx93-jvxw

<2.2.0-r3
  • M
Information Exposure Through Log Files

<2.2.0-r3
  • L
GHSA-9wx4-h78v-vm56

<2.2.0-r2
  • L
CVE-2024-35195

<2.2.0-r2
  • L
GHSA-33c5-9fx5-fvjm

<2.14.3-r3
  • M
Open Redirect

<2.14.3-r3
  • L
GHSA-jjg7-2v4v-x38h

<2.1.0-r0
  • H
Inefficient Regular Expression Complexity

<2.1.0-r0
  • L
GHSA-pxhw-596r-rwq5

<2.14.3-r3
  • L
CVE-2024-3177

<2.14.3-r3
  • L
CVE-2023-45288

<2.0.5-r7
  • L
GHSA-4v7x-pqxf-cx7m

<2.0.5-r7
  • H
Improper Input Validation

<2.14.3-r3
  • L
GHSA-q78c-gwqw-jcmc

<2.14.3-r3
  • L
GHSA-cxjh-pqwp-8mfp

<2.0.5-r5
  • L
CVE-2024-24786

<2.0.5-r5
  • L
GHSA-8r3f-844c-mc37

<2.0.5-r5
  • L
CVE-2024-28849

<2.0.5-r5
  • L
CVE-2023-45290

<2.0.5-r4
  • L
GHSA-3q2c-pvp5-3cqp

<2.0.5-r4
  • L
GHSA-32ch-6x54-q4h9

<2.0.5-r4
  • L
CVE-2024-24785

<2.0.5-r4
  • L
GHSA-rr6r-cfgf-gc6h

<2.0.5-r4
  • L
GHSA-fgq5-q76c-gx78

<2.0.5-r4
  • L
CVE-2024-24784

<2.0.5-r4
  • L
CVE-2023-45289

<2.0.5-r4
  • L
CVE-2024-24783

<2.0.5-r4
  • L
GHSA-j6m3-gc37-6r6q

<2.0.5-r4
  • L
GHSA-6vqw-3v5j-54x4

<2.0.5-r3
  • H
NULL Pointer Dereference

<2.0.5-r3
  • L
GHSA-9v9h-cgj8-h64p

<2.0.5-r3
  • M
CVE-2024-0727

<2.0.5-r3
  • L
GHSA-3ww4-gg4f-jr7f

<2.0.5-r3
  • H
Covert Timing Channel

<2.0.5-r3
  • L
GHSA-jchw-25xp-jwwc

<2.0.5-r2
  • M
Open Redirect

<2.0.5-r2
  • M
Improper Validation of Integrity Check Value

<2.0.5-r1
  • L
GHSA-45x7-px36-x8w8

<2.0.5-r1