k3s-1.32

Direct Vulnerabilities

Known vulnerabilities in the k3s-1.32 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-78h2-9frx-2jm8

<1.32.13.1-r9
  • L
Uncaught Exception

<1.32.13.1-r9
  • L
CVE-2026-32285

<1.32.13.1-r6
  • L
Arbitrary Command Injection

<1.32.13.1-r8
  • L
GHSA-vchx-5pr6-ffx2

<1.32.13.1-r8
  • L
Improper Input Validation

<1.32.13.1-r7
  • H
Plaintext Storage of a Password

<1.32.13.1-r7
  • L
Allocation of Resources Without Limits or Throttling

<1.32.13.1-r7
  • M
Incorrect Authorization

<1.32.13.1-r7
  • L
Improper Authorization

<1.32.13.1-r7
  • L
GHSA-8m2x-3m6q-6w8j

<1.32.13.1-r7
  • L
GHSA-3f24-pcvm-5jqc

<1.32.13.1-r7
  • M
Information Exposure

<1.32.13.1-r7
  • L
GHSA-vprv-35vv-q339

<1.32.13.1-r7
  • L
GHSA-55h8-8g96-x4hj

<1.32.13.1-r7
  • L
Improper Authentication

<1.32.13.1-r7
  • M
Improper Authentication

<1.32.13.1-r7
  • L
GHSA-9983-vrx2-fg9c

<1.32.13.1-r7
  • L
GHSA-x6g4-f6q3-fqvv

<1.32.13.1-r7
  • L
GHSA-jxxm-27vp-c3m5

<1.32.13.1-r7
  • L
GHSA-fcjp-h8cc-6879

<1.32.13.1-r7
  • M
Authentication Bypass

<1.32.13.1-r7
  • L
GHSA-pwx7-fx9r-hr4h

<1.32.13.1-r7
  • L
GHSA-8r68-gvr4-jh7j

<1.32.13.1-r7
  • L
GHSA-6g7g-w4f8-9c9x

<1.32.13.1-r6
  • L
GHSA-v722-jcv5-w7mc

<1.32.13.1-r7
  • M
Improper Authentication

<1.32.13.1-r7
  • L
Incorrect Authorization

<1.32.13.1-r7
  • L
GHSA-52jh-2xxh-pwh6

<1.32.13.1-r5
  • L
GHSA-pq2q-rcw4-3hr6

<1.32.13.1-r5
  • L
GHSA-p77j-4mvh-x3m3

<1.32.13.1-r4
  • L
Improper Authorization

<1.32.13.1-r4
  • M
CVE-2025-47911

<1.32.13.1-r4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.32.13.1-r4
  • L
NULL Pointer Dereference

<1.32.13.1-r5
  • L
GHSA-w4gw-w5jq-g9jh

<1.32.13.1-r4
  • L
Integer Overflow or Wraparound

<1.32.13.1-r5
  • L
GHSA-f6x5-jh6r-wrfv

<1.32.13.1-r2
  • L
GHSA-fw7p-63qq-7hpr

<1.32.13.1-r2
  • L
Reachable Assertion

<1.32.13.1-r2
  • L
GHSA-px4r-g4p3-hhqv

<1.32.13.1-r2
  • L
GHSA-g6x7-jq8p-6q9q

<1.32.13.1-r2
  • L
Improper Initialization

<1.32.13.1-r2
  • L
CVE-2025-22869

<1.32.13.1-r2
  • L
GHSA-56w8-48fp-6mgv

<1.32.13.1-r2
  • L
GHSA-v778-237x-gjrc

<1.32.13.1-r2
  • L
GHSA-2f2x-8mwp-p2gc

<1.32.13.1-r2
  • L
CVE-2024-45337

<1.32.13.1-r2
  • L
CVE-2025-47914

<1.32.13.1-r2
  • M
Missing Initialization of Resource

<1.32.13.1-r2
  • H
Resource Exhaustion

<1.32.13.1-r2
  • L
GHSA-hcg3-q754-cr77

<1.32.13.1-r2
  • L
CVE-2025-58181

<1.32.13.1-r2
  • H
Allocation of Resources Without Limits or Throttling

<1.32.13.1-r2
  • L
Memory Leak

<1.32.13.1-r2
  • L
GHSA-4vq8-7jfc-9cvp

<1.32.13.1-r2
  • L
GHSA-j5w8-q4qc-rx2x

<1.32.13.1-r2
  • L
GHSA-p436-gjf2-799p

<1.32.13.1-r1
  • H
CVE-2025-15558

<1.32.13.1-r1
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<1.32.12.1-r2
  • L
GHSA-qrvq-68c2-7grw

<1.32.12.1-r2
  • L
GHSA-47m2-4cr7-mhcw

<1.32.9.1-r1
  • L
GHSA-864f-7xjm-2jp2

<1.32.6.1-r0
  • H
Symlink Following

<1.32.9.1-r2
  • L
GHSA-vvgc-356p-c3xw

<1.32.9.1-r2
  • L
Asymmetric Resource Consumption (Amplification)

<1.32.6.1-r0
  • L
Reachable Assertion

<1.32.9.1-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.32.11.1-r1
  • L
CVE-2025-22870

<1.32.7.1-r1
  • L
GHSA-qxp5-gwg8-xv66

<1.32.7.1-r1
  • L
GHSA-9493-h29p-rfm2

<1.32.9.1-r2
  • L
CVE-2025-22872

<1.32.9.1-r2
  • H
Symlink Following

<1.32.9.1-r2
  • L
GHSA-7c64-f9jr-v9h2

<1.32.10.1-r1
  • L
CVE-2025-22868

<1.32.6.1-r0
  • L
Allocation of Resources Without Limits or Throttling

<1.32.6.1-r0
  • L
Improper Certificate Validation

<1.32.10.1-r1
  • L
GHSA-qw9x-cqr3-wc7r

<1.32.9.1-r2
  • H
Symlink Following

<1.32.11.1-r0
  • L
GHSA-cfpf-hrx2-8rv6

<1.32.11.1-r1
  • L
GHSA-cgrx-mc8f-2prm

<1.32.11.1-r0
  • L
GHSA-j5pm-7495-qmr3

<1.32.7.1-r2
  • L
Race Condition

<1.32.7.1-r2
  • L
CVE-2024-45338

<1.32.7.1-r1
  • L
CVE-2025-46599

<1.32.6.1-r0
  • L
GHSA-c6gw-w398-hv78

<1.32.6.1-r0
  • L
GHSA-g754-hx8w-x2g6

<1.32.11.3-r0
  • L
GHSA-w32m-9786-jp63

<1.32.7.1-r1
  • L
Allocation of Resources Without Limits or Throttling

<1.32.11.3-r0
  • L
GHSA-mh63-6h87-95cp

<1.32.6.1-r0
  • L
CVE-2025-47910

<1.32.8.1-r1
  • L
GHSA-9h8m-3fm2-qjrq

<1.32.12.1-r1
  • L
Untrusted Search Path

<1.32.12.1-r1
  • L
GHSA-8pjc-487g-w6p2

<1.32.8.1-r1
  • L
GHSA-6v2p-p543-phr9

<1.32.6.1-r0