Direct Vulnerabilities

Known vulnerabilities in the k3s package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-vchx-5pr6-ffx2

<1.35.2.1-r5
  • L
Arbitrary Command Injection

<1.35.2.1-r5
  • L
GHSA-fcjp-h8cc-6879

<1.35.2.1-r4
  • L
GHSA-pwx7-fx9r-hr4h

<1.35.2.1-r4
  • M
Improper Authentication

<1.35.2.1-r4
  • L
GHSA-vprv-35vv-q339

<1.35.2.1-r4
  • L
GHSA-8m2x-3m6q-6w8j

<1.35.2.1-r4
  • L
Improper Input Validation

<1.35.2.1-r4
  • L
Allocation of Resources Without Limits or Throttling

<1.35.2.1-r4
  • L
GHSA-9983-vrx2-fg9c

<1.35.2.1-r4
  • L
GHSA-jxxm-27vp-c3m5

<1.35.2.1-r4
  • L
Improper Authentication

<1.35.2.1-r4
  • M
Incorrect Authorization

<1.35.2.1-r4
  • M
Information Exposure

<1.35.2.1-r4
  • L
GHSA-55h8-8g96-x4hj

<1.35.2.1-r4
  • L
Improper Authorization

<1.35.2.1-r4
  • L
GHSA-3f24-pcvm-5jqc

<1.35.2.1-r4
  • M
Authentication Bypass

<1.35.2.1-r4
  • H
Plaintext Storage of a Password

<1.35.2.1-r4
  • L
GHSA-8r68-gvr4-jh7j

<1.35.2.1-r4
  • M
Improper Authentication

<1.35.2.1-r4
  • L
GHSA-x6g4-f6q3-fqvv

<1.35.2.1-r4
  • L
Incorrect Authorization

<1.35.2.1-r4
  • L
GHSA-v722-jcv5-w7mc

<1.35.2.1-r4
  • L
NULL Pointer Dereference

<1.35.2.1-r3
  • L
GHSA-52jh-2xxh-pwh6

<1.35.2.1-r3
  • L
GHSA-6g7g-w4f8-9c9x

<1.35.2.1-r2
  • L
GHSA-p436-gjf2-799p

<1.35.2.1-r1
  • H
CVE-2025-15558

<1.35.2.1-r1
  • L
Untrusted Search Path

<1.35.1.1-r2
  • L
GHSA-9h8m-3fm2-qjrq

<1.35.1.1-r2
  • L
GHSA-g6x7-jq8p-6q9q

<1.35.1.1-r1
  • L
Improper Initialization

<1.35.1.1-r1
  • L
GHSA-px4r-g4p3-hhqv

<1.35.1.1-r1
  • H
Allocation of Resources Without Limits or Throttling

<1.35.1.1-r1
  • H
Resource Exhaustion

<1.35.1.1-r1
  • L
GHSA-fw7p-63qq-7hpr

<1.35.1.1-r1
  • L
GHSA-2f2x-8mwp-p2gc

<1.35.1.1-r1
  • L
Memory Leak

<1.35.1.1-r1
  • L
GHSA-xvqr-69v8-f3gv

<1.35.0.1-r2
  • L
Allocation of Resources Without Limits or Throttling

<1.35.0.1-r2
  • L
GHSA-cm6p-qc7v-m3jw

<1.35.0.1-r2
  • L
Allocation of Resources Without Limits or Throttling

<1.35.0.1-r2
  • L
GHSA-gr56-3gp6-6gmj

<1.35.0.1-r2
  • L
GHSA-gm9r-q53w-2gh4

<1.35.0.1-r2
  • L
Out-of-bounds Write

<1.35.0.1-r2
  • L
CVE-2025-61731

<1.35.0.1-r2
  • L
GHSA-g9q4-qjx4-2v7q

<1.35.0.1-r2
  • L
CVE-2025-61730

<1.35.0.1-r2
  • L
GHSA-6v2p-p543-phr9

<1.32.2.1-r31
  • L
GHSA-cfpf-hrx2-8rv6

<1.34.2.1-r2
  • L
Allocation of Resources Without Limits or Throttling

<1.34.2.1-r2
  • L
GHSA-7c64-f9jr-v9h2

<1.34.2.1-r1
  • L
Improper Certificate Validation

<1.34.2.1-r1
  • L
CVE-2025-47914

<1.34.1.1-r4
  • L
CVE-2025-58181

<1.34.1.1-r4
  • L
GHSA-f6x5-jh6r-wrfv

<1.34.1.1-r4
  • L
GHSA-j5w8-q4qc-rx2x

<1.34.1.1-r4
  • H
Incorrect Execution-Assigned Permissions

<1.34.1.1-r3
  • L
GHSA-m6hq-p25p-ffr2

<1.34.1.1-r3
  • M
Memory Leak

<1.34.1.1-r3
  • L
GHSA-pwhc-rpq9-4c8w

<1.34.1.1-r3
  • H
Symlink Following

<1.34.1.1-r2
  • L
GHSA-cgrx-mc8f-2prm

<1.34.1.1-r2
  • L
Reachable Assertion

<1.34.1.1-r1
  • L
GHSA-47m2-4cr7-mhcw

<1.34.1.1-r1
  • L
CVE-2025-47910

<1.34.1.1-r0
  • L
GHSA-8pjc-487g-w6p2

<1.34.1.1-r0
  • L
Race Condition

<1.33.3.1-r1
  • L
GHSA-j5pm-7495-qmr3

<1.33.3.1-r1
  • L
GHSA-f26w-gh5m-qq77

<1.33.1.1-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.33.1.1-r1
  • L
GHSA-cxfp-7pvr-95ff

<1.33.0.1-r2
  • H
Incorrect Privilege Assignment

<1.33.0.1-r2
  • L
GHSA-hcg3-q754-cr77

<1.32.4.1-r1
  • L
GHSA-864f-7xjm-2jp2

<1.32.4.1-r0
  • L
CVE-2025-46599

<1.32.4.1-r0
  • L
GHSA-g9pc-8g42-g6vq

<1.32.3.1-r1
  • L
CVE-2025-22871

<1.32.3.1-r1
  • L
GHSA-mh63-6h87-95cp

<1.32.2.1-r34
  • L
Asymmetric Resource Consumption (Amplification)

<1.32.2.1-r34
  • L
CVE-2025-22869

<1.32.4.1-r1
  • L
CVE-2025-22868

<1.32.2.1-r31
  • L
Allocation of Resources Without Limits or Throttling

<1.32.1.1-r2
  • L
GHSA-c6gw-w398-hv78

<1.32.1.1-r2
  • L
GHSA-3whm-j4xm-rv8x

<1.32.1.1-r1
  • L
CVE-2025-22866

<1.32.1.1-r1
  • L
GHSA-xr7q-jx4m-x55m

<1.31.4.1-r2
  • L
GHSA-v778-237x-gjrc

<1.32.4.1-r1
  • L
CVE-2024-45337

<1.32.4.1-r1
  • L
GHSA-px8v-pp82-rcvr

<1.31.3.1-r0
  • L
Insufficient Verification of Data Authenticity

<1.31.3.1-r0
  • L
Improper Handling of Exceptional Conditions

<1.31.2.1-r3
  • L
GHSA-29wx-vh33-7x7r

<1.31.2.1-r3
  • L
CVE-2024-45310

<1.31.0.1-r1
  • L
GHSA-jfvp-7x6p-h2pv

<1.31.0.1-r1
  • L
CVE-2024-34155

<1.30.4.1-r1
  • L
GHSA-j7vj-rw65-4v26

<1.30.4.1-r1
  • L
CVE-2024-34158

<1.30.4.1-r1
  • L
GHSA-crqm-pwhx-j97f

<1.30.4.1-r1
  • L
CVE-2024-34156

<1.30.4.1-r1
  • L
GHSA-8xfx-rj4p-23jm

<1.30.4.1-r1
  • L
GHSA-v23v-6jw2-98fq

<1.30.3.1-r0
  • L
CVE-2024-41110

<1.30.3.1-r0
  • L
CVE-2024-24791

<1.30.2-r1
  • L
GHSA-hw49-2p59-3mhj

<1.30.2-r1
  • L
GHSA-v6v8-xj6m-xwqh

<1.30.1-r2
  • M
Information Exposure Through Log Files

<1.30.1-r2
  • M
CVE-2024-24789

<1.30.1-r1
  • L
GHSA-236w-p7wf-5ph8

<1.30.1-r1
  • C
CVE-2024-24790

<1.30.1-r1
  • L
GHSA-49gw-vxvf-fc2g

<1.30.1-r1
  • L
GHSA-4v7x-pqxf-cx7m

<1.29.3-r4
  • L
CVE-2023-45288

<1.29.3-r4
  • L
CVE-2024-22189

<1.29.3-r3
  • L
GHSA-c33x-xqrf-c478

<1.29.3-r3
  • L
GHSA-xw73-rw38-6vjc

<1.29.2-r5
  • H
Origin Validation Error

<1.29.2-r5
  • L
CVE-2024-27304

<1.29.2-r3
  • L
GHSA-mrww-27vc-gghv

<1.29.2-r3
  • L
GHSA-7jwh-3vrq-q3m8

<1.29.2-r3
  • L
CVE-2024-24786

<1.29.2-r2
  • L
GHSA-8r3f-844c-mc37

<1.29.2-r2
  • L
GHSA-32ch-6x54-q4h9

<1.29.2-r1
  • L
GHSA-fgq5-q76c-gx78

<1.29.2-r1
  • L
CVE-2024-24784

<1.29.2-r1
  • L
CVE-2023-45290

<1.29.2-r1
  • L
GHSA-j6m3-gc37-6r6q

<1.29.2-r1
  • L
GHSA-rr6r-cfgf-gc6h

<1.29.2-r1
  • L
CVE-2023-45289

<1.29.2-r1
  • L
CVE-2024-24783

<1.29.2-r1
  • L
GHSA-3q2c-pvp5-3cqp

<1.29.2-r1
  • L
CVE-2024-24785

<1.29.2-r1
  • L
GHSA-xr7r-f8xq-vfvv

<1.29.0-r1
  • H
Exposure of Resource to Wrong Sphere

<1.29.0-r1
  • L
GHSA-45x7-px36-x8w8

<1.28.4-r0
  • M
Improper Validation of Integrity Check Value

<1.28.4-r0
  • L
GHSA-mr45-rx8q-wcm9

<1.28.3-r1
  • L
GHSA-2wrh-6pvc-2jm9

<1.28.2-r1
  • L
GHSA-4374-p667-p6c8

<1.28.2-r1
  • L
GHSA-rcjv-mgp8-qvmr

<1.28.2-r2
  • L
GHSA-m4hf-6vgr-75r2

<1.27.5-r0
  • L
GHSA-8pgv-569h-w5rw

<1.28.3-r2
  • L
GHSA-6xv5-86q9-7xr8

<1.28.3-r2
  • H
CVE-2023-47108

<1.28.3-r2
  • L
GHSA-jq35-85cj-fj4p

<1.28.3-r2
  • H
Use of Hard-coded Cryptographic Key

<1.28.3-r1
  • H
Allocation of Resources Without Limits or Throttling

<1.28.2-r2
  • H
Allocation of Resources Without Limits or Throttling

<1.28.2-r1
  • H
Allocation of Resources Without Limits or Throttling

<1.27.5-r0
  • M
Cross-site Scripting (XSS)

<1.28.2-r1