Incorrect Authorization Affecting github.com/portainer/portainer/api/http/handler/kubernetes package, versions >=2.33.0 <2.33.8>=2.34.0 <2.39.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMPORTAINERPORTAINERAPIHTTPHANDLERKUBERNETES-16733928
  • published18 May 2026
  • disclosed14 May 2026
  • creditkolega-ai-dev

Introduced: 14 May 2026

NewCVE-2026-44882  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade github.com/portainer/portainer/api/http/handler/kubernetes to version 2.33.8, 2.39.0 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Authorization in the kubeClientMiddleware process. An attacker can gain unauthorized access to Kubernetes resources by sending requests with a valid session but insufficient permissions, which are incorrectly forwarded to the cluster due to missing authorization enforcement. This can allow reading or modifying sensitive cluster data.

Workaround

This vulnerability can be mitigated by restricting Kubernetes endpoint access to only necessary users and auditing the RBAC permissions of the service account used for proxying cluster requests.

CVSS Base Scores

version 4.0
version 3.1