CVE-2026-41050 - Vulnerability Analysis
CriticalCVSS: 9.9Last Updated: May 13, 2026
Fleet Helm - Broken Access Control
Overview
Fleet Helm deployer contains a broken access control caused by incomplete ServiceAccount impersonation in two code paths, letting tenants with git push access read secrets from any namespace on downstream clusters, exploit requires git push access.
Severity & Score
Impact
Tenants with git push access can read secrets from any namespace on all targeted downstream clusters, risking sensitive data exposure.
Mitigation
Update to the latest version with fixed ServiceAccount impersonation.
References
Social Media Activity(4 posts)
š“ CVE-2026-41050 - Critical (9.9) Fleet's Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their `GitR... š https://www.thehackerwire.com/vulnerability/CVE-2026-41050/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš„ CRITICAL: SUSE Rancher Fleet Helm deployer (0.11.0 ā 0.15.0) has a major auth flaw (CVE-2026-41050). Tenants with git push access can read secrets from any namespace in downstream clusters. Restrict access & monitor closely! https://radar.offseq.com/threat/cve-2026-41050-cwe-863-incorrect-authorization-in--5c35f924 #OffSeq #SUSE #Kubernetes
View original postš“ CVE-2026-41050 - Critical (9.9) Fleet's Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their `GitR... š https://www.thehackerwire.com/vulnerability/CVE-2026-41050/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš„ CRITICAL: SUSE Rancher Fleet Helm deployer (0.11.0 ā 0.15.0) has a major auth flaw (CVE-2026-41050). Tenants with git push access can read secrets from any namespace in downstream clusters. Restrict access & monitor closely! https://radar.offseq.com/threat/cve-2026-41050-cwe-863-incorrect-authorization-in--5c35f924 #OffSeq #SUSE #Kubernetes
View original postRelated Resources
Details
- CVE ID
- CVE-2026-41050
- Severity
- Critical
- CVSS Score
- 9.9
- Type
- broken_access_control
- Status
- unconfirmed
- EPSS
- 3.9%
- Social Posts
- 4
CWE
- CWE-863
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H