Improper Privilege Management Affecting flux-operator package, versions <0.40.0-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.07% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Privilege Management vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-WOLFILATEST-FLUXOPERATOR-15385040
  • published4 Mar 2026
  • disclosed21 Jan 2026

Introduced: 21 Jan 2026

CVE-2026-23990  (opens in a new tab)
CWE-269  (opens in a new tab)
CWE-862  (opens in a new tab)

How to fix?

Upgrade Wolfi flux-operator to version 0.40.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream flux-operator package and not the flux-operator package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

The Flux Operator is a Kubernetes CRD controller that manages the lifecycle of CNCF Flux CD and the ControlPlane enterprise distribution. Starting in version 0.36.0 and prior to version 0.40.0, a privilege escalation vulnerability exists in the Flux Operator Web UI authentication code that allows an attacker to bypass Kubernetes RBAC impersonation and execute API requests with the operator's service account privileges. In order to be vulnerable, cluster admins must configure the Flux Operator with an OIDC provider that issues tokens lacking the expected claims (e.g., email, groups), or configure custom CEL expressions that can evaluate to empty values. After OIDC token claims are processed through CEL expressions, there is no validation that the resulting username and groups values are non-empty. When both values are empty, the Kubernetes client-go library does not add impersonation headers to API requests, causing them to be executed with the flux-operator service account's credentials instead of the authenticated user's limited permissions. This can result in privilege escalation, data exposure, and/or information disclosure. Version 0.40.0 patches the issue.