k8sgpt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the k8sgpt package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-6g7g-w4f8-9c9x

<0.4.30-r4
  • L
GHSA-p77j-4mvh-x3m3

<0.4.30-r3
  • L
Improper Authorization

<0.4.30-r3
  • L
GHSA-j4j7-vw47-rhfq

<0.4.30-r2
  • L
CVE-2026-27139

<0.4.30-r2
  • L
GHSA-j3gx-2473-5fp8

<0.4.30-r2
  • L
CVE-2026-27142

<0.4.30-r2
  • L
CVE-2026-25679

<0.4.30-r2
  • L
GHSA-rv83-g57w-fr8j

<0.4.30-r2
  • L
CVE-2025-51471

<0.4.28-r0
  • L
GHSA-5mh9-3jwc-rp59

<0.4.26-r3
  • L
Improper Validation of Array Index

<0.4.28-r0
  • L
GHSA-8pjc-487g-w6p2

<0.4.25-r1
  • L
CVE-2025-47910

<0.4.25-r1
  • H
Authentication Bypass

<0.3.42-r1
  • L
CVE-2024-34156

<0.3.40-r1
  • L
GHSA-8xfx-rj4p-23jm

<0.3.40-r1
  • L
CVE-2025-22866

<0.3.48-r5
  • L
GHSA-crqm-pwhx-j97f

<0.3.40-r1
  • L
Improper Certificate Validation

<0.4.26-r3
  • L
CVE-2025-22868

<0.4.0-r1
  • L
GHSA-f6x5-jh6r-wrfv

<0.4.26-r2
  • L
GHSA-6f52-wpx2-hvf2

<0.4.17-r2
  • L
CVE-2025-22874

<0.4.17-r2
  • L
GHSA-v725-9546-7q7m

<0.3.48-r3
  • L
GHSA-45x7-px36-x8w8

<0.4.1-r1
  • L
GHSA-qxp5-gwg8-xv66

<0.4.0-r3
  • L
CVE-2025-58181

<0.4.26-r2
  • L
GHSA-j7vj-rw65-4v26

<0.3.40-r1
  • C
CVE-2025-68121

<0.4.27-r3
  • L
GHSA-8jvr-vh7g-f8gx

<0.4.27-r3
  • H
Arbitrary Code Injection

<0.4.26-r0
  • L
GHSA-w32m-9786-jp63

<0.3.48-r2
  • L
GHSA-62jj-gr2r-5c34

<0.4.17-r2
  • H
Integer Overflow or Wraparound

<0.4.1-r1
  • L
GHSA-3whm-j4xm-rv8x

<0.3.48-r5
  • L
GHSA-557j-xg8c-q2mm

<0.4.26-r0
  • L
CVE-2025-4673

<0.4.17-r2
  • L
CVE-2024-45336

<0.3.48-r4
  • L
GHSA-h355-32pf-p2xm

<0.4.27-r3
  • L
Arbitrary Argument Injection

<0.3.48-r3
  • L
GHSA-j5w8-q4qc-rx2x

<0.4.26-r2
  • L
CVE-2025-47914

<0.4.26-r2
  • L
CVE-2024-34155

<0.3.40-r1
  • L
Allocation of Resources Without Limits or Throttling

<0.4.26-r4
  • L
CVE-2025-22870

<0.4.0-r3
  • L
CVE-2025-22869

<0.4.0-r2
  • L
CVE-2025-22872

<0.4.12-r0
  • L
CVE-2024-34158

<0.3.40-r1
  • L
CVE-2024-45338

<0.3.48-r2
  • L
Resource Exhaustion

<0.3.48-r3
  • L
GHSA-v778-237x-gjrc

<0.3.48-r1
  • L
GHSA-6v2p-p543-phr9

<0.4.0-r1
  • L
GHSA-vvgc-356p-c3xw

<0.4.12-r0
  • L
Allocation of Resources Without Limits or Throttling

<0.4.1-r1
  • L
GHSA-cfpf-hrx2-8rv6

<0.4.26-r4
  • L
CVE-2025-61732

<0.4.27-r3
  • L
GHSA-c4p6-qg4m-9jmr

<0.4.27-r1
  • L
GHSA-hcg3-q754-cr77

<0.4.0-r2
  • L
GHSA-9h8m-3fm2-qjrq

<0.4.30-r1
  • L
GHSA-7ww5-4wqc-m92c

<0.4.1-r1
  • H
Incorrect Execution-Assigned Permissions

<0.4.26-r1
  • L
Directory Traversal

<0.4.27-r1
  • L
GHSA-pwhc-rpq9-4c8w

<0.4.26-r1
  • L
GHSA-93mq-9ffx-83m2

<0.4.1-r1
  • L
GHSA-mh63-6h87-95cp

<0.4.1-r2
  • L
Asymmetric Resource Consumption (Amplification)

<0.4.1-r2
  • L
CVE-2024-45341

<0.3.48-r4
  • L
GHSA-7wrw-r4p8-38rx

<0.3.48-r4
  • L
GHSA-wrh5-cmwx-q2qr

<0.4.28-r0
  • M
Memory Leak

<0.4.26-r1
  • L
GHSA-m6hq-p25p-ffr2

<0.4.26-r1
  • L
Race Condition

<0.4.23-r0
  • M
Improper Validation of Integrity Check Value

<0.4.1-r1
  • L
GHSA-265r-hfxg-fhmg

<0.4.1-r1
  • L
Improper Certificate Validation

<0.4.26-r3
  • L
GHSA-j5pm-7495-qmr3

<0.4.23-r0
  • L
GHSA-7c64-f9jr-v9h2

<0.4.26-r3
  • L
GHSA-c77r-fh37-x2px

<0.3.42-r1
  • L
GHSA-3f6r-qh9c-x6mm

<0.3.48-r4
  • L
GHSA-x9hg-5q6g-q3jr

<0.4.28-r0
  • L
CVE-2024-45337

<0.3.48-r1
  • L
GHSA-r9px-m959-cxf4

<0.3.48-r3
  • L
Untrusted Search Path

<0.4.30-r1
  • L
GHSA-v23v-6jw2-98fq

<0.3.39-r1
  • L
CVE-2024-41110

<0.3.39-r1
  • L
GHSA-xr7q-jx4m-x55m

<0.3.37-r2
  • L
GHSA-hw49-2p59-3mhj

<0.3.37-r1
  • L
CVE-2024-24791

<0.3.37-r1
  • L
GHSA-m5vv-6r4h-3vj9

<0.3.32-r3
  • M
Race Condition

<0.3.32-r3
  • C
CVE-2024-24790

<0.3.32-r2
  • M
CVE-2024-24789

<0.3.32-r2
  • L
GHSA-236w-p7wf-5ph8

<0.3.32-r2
  • L
GHSA-49gw-vxvf-fc2g

<0.3.32-r2
  • L
GHSA-xcq4-m2r3-cmrj

<0.3.32-r1
  • L
CVE-2024-35192

<0.3.32-r1
  • L
CVE-2024-24787

<0.3.30-r1
  • L
CVE-2024-24788

<0.3.30-r1
  • L
GHSA-5fq7-4mxc-535h

<0.3.30-r1
  • L
GHSA-2jwv-jmq4-4j3r

<0.3.30-r1
  • L
GHSA-4v7x-pqxf-cx7m

<0.3.29-r1
  • L
CVE-2023-45288

<0.3.29-r1
  • L
GHSA-xw73-rw38-6vjc

<0.3.28-r2
  • H
Origin Validation Error

<0.3.28-r2
  • L
CVE-2024-24786

<0.3.28-r1
  • L
GHSA-8r3f-844c-mc37

<0.3.28-r1
  • L
GHSA-rr6r-cfgf-gc6h

<0.3.27-r3
  • L
CVE-2024-24783

<0.3.27-r3
  • L
CVE-2023-45290

<0.3.27-r3
  • L
GHSA-fgq5-q76c-gx78

<0.3.27-r3
  • L
CVE-2024-24785

<0.3.27-r3
  • L
CVE-2023-45289

<0.3.27-r3
  • L
GHSA-j6m3-gc37-6r6q

<0.3.27-r3
  • L
GHSA-3q2c-pvp5-3cqp

<0.3.27-r3
  • L
CVE-2024-24784

<0.3.27-r3
  • L
GHSA-32ch-6x54-q4h9

<0.3.27-r3
  • L
GHSA-r53h-jv2g-vpx6

<0.3.27-r2
  • H
Use of Uninitialized Resource

<0.3.27-r2
  • L
GHSA-v53g-5gjp-272r

<0.3.27-r1
  • M
Directory Traversal

<0.3.27-r1
  • L
GHSA-4374-p667-p6c8

<0.3.18-r1
  • L
GHSA-2wrh-6pvc-2jm9

<0.3.18-r1
  • M
Cross-site Scripting (XSS)

<0.3.18-r1
  • H
Allocation of Resources Without Limits or Throttling

<0.3.18-r1