CVE-2025-1767
📋 TL;DR
This CVE affects Kubernetes clusters using the deprecated in-tree gitRepo volume feature to clone git repositories from other pods on the same node. The vulnerability could allow unauthorized access or manipulation of git repository data. Only clusters still using this deprecated feature are affected.
💻 Affected Systems
- Kubernetes
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker could gain unauthorized access to sensitive git repository data, potentially exposing credentials, source code, or configuration secrets stored in repositories.
Likely Case
Unauthorized reading or modification of git repository contents between pods sharing the same node, potentially leading to data leakage or repository corruption.
If Mitigated
Limited impact with proper pod isolation and network policies preventing inter-pod communication.
🎯 Exploit Status
Requires access to the Kubernetes cluster and knowledge of pods using gitRepo volumes on the same node.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A - Feature deprecated, no patch available
Vendor Advisory: https://groups.google.com/g/kubernetes-security-announce/c/19irihsKg7s
Restart Required: No
Instructions:
Migrate from in-tree gitRepo volumes to CSI drivers or other alternatives. The feature is deprecated and will not be patched.
🔧 Temporary Workarounds
Migrate to CSI git volume driver
allReplace in-tree gitRepo volumes with CSI-compatible git volume drivers
# Update pod specifications to use CSI git driver instead of gitRepo
# Example: Replace 'gitRepo' with appropriate CSI driver configuration
Disable gitRepo volume usage
allRemove or replace all gitRepo volume configurations in cluster
kubectl get pods --all-namespaces -o yaml | grep -i gitrepo
# Review and update affected pod configurations
🧯 If You Can't Patch
- Implement strict network policies to isolate pods using gitRepo volumes
- Apply pod security standards to restrict pod-to-pod communication on affected nodes
🔍 How to Verify
Check if Vulnerable:
Check for pods using gitRepo volumes: kubectl get pods --all-namespaces -o yaml | grep -i 'gitRepo'
Check Version:
kubectl version
Verify Fix Applied:
Confirm no pods are using gitRepo volumes: kubectl get pods --all-namespaces -o yaml | grep -i 'gitRepo' should return no results
📡 Detection & Monitoring
Log Indicators:
- Unusual git operations between pods
- Failed git clone attempts from unexpected sources
Network Indicators:
- Unexpected git protocol traffic between pods on same node
SIEM Query:
kubernetes.pod.volume.type:gitRepo OR kubernetes.event.reason:GitVolumeAccess