CVE-2026-40109
Received Received - Intake
Authentication Bypass in Flux Notification-Controller gcr Receiver

Publication date: 2026-04-09

Last updated on: 2026-04-09

Assigner: GitHub, Inc.

Description
Flux notification-controller is the event forwarder and notification dispatcher for the GitOps Toolkit controllers. Prior to 1.8.3, the gcr Receiver type in Flux notification-controller does not validate the email claim of Google OIDC tokens used for Pub/Sub push authentication. This allows any valid Google-issued token, to authenticate against the Receiver webhook endpoint, triggering unauthorized Flux reconciliations. Exploitation requires the attacker to know the Receiver's webhook URL. The webhook path is generated as /hook/sha256sum(token+name+namespace), where the token is a random string stored in a Kubernetes Secret. There is no API or endpoint that enumerates webhook URLs. An attacker cannot discover the path without either having access to the cluster and permissions to read the Receiver's .status.webhookPath in the target namespace, or obtaining the URL through other means (e.g. leaked secrets or access to Pub/Sub config). Upon successful authentication, the controller triggers a reconciliation for all resources listed in the Receiver's .spec.resources. However, the practical impact is limited: Flux reconciliation is idempotent, so if the desired state in the configured sources (Git, OCI, Helm) has not changed, the reconciliation results in a no-op with no effect on cluster state. Additionally, Flux controllers deduplicate reconciliation requests, sending many requests in a short period results in only a single reconciliation being processed. This vulnerability is fixed in 1.8.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-09
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fluxcd notification-controller 1.8.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the Flux notification-controller prior to version 1.8.3, specifically in the gcr Receiver type. It does not validate the email claim of Google OIDC tokens used for Pub/Sub push authentication. This means that any valid Google-issued token can authenticate against the Receiver webhook endpoint without proper verification.

To exploit this, an attacker must know the Receiver's webhook URL, which is generated using a hash of a token, name, and namespace. Since the webhook URL is not publicly enumerable and requires access to the cluster or leaked secrets to discover, exploitation is limited.

If successfully exploited, the attacker can trigger unauthorized Flux reconciliations, causing the controller to reconcile all resources listed in the Receiver's configuration. However, because Flux reconciliation is idempotent and deduplicates requests, repeated or unnecessary reconciliations have limited practical impact.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability allows an attacker who knows the Receiver's webhook URL to trigger unauthorized Flux reconciliations. This could potentially cause unexpected or unwanted operations within the cluster.

However, the impact is limited because Flux reconciliation is idempotent, meaning if the desired state has not changed, the reconciliation will have no effect on the cluster state.

Additionally, Flux controllers deduplicate reconciliation requests, so multiple rapid requests result in only a single reconciliation, reducing the risk of denial-of-service or resource exhaustion.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed in Flux notification-controller version 1.8.3. The immediate step to mitigate this vulnerability is to upgrade the Flux notification-controller to version 1.8.3 or later.

Since exploitation requires knowledge of the Receiver's webhook URL, ensure that access to Kubernetes Secrets and the Receiver's .status.webhookPath is tightly controlled and that secrets are not leaked.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart