There is a ClusterRole in piraeus-operator v2.5.0 and earlier which has been granted list secrets permission, which allows an attacker to impersonate the service account bound to this ClusterRole and use its high-risk privileges to list confidential information across the cluster.
https://github.com/piraeusdatastore/piraeus-operator
https://github.com/HouqiyuA/k8s-rbac-poc
https://gist.github.com/HouqiyuA/d0c11fae5ba4789946ae33175d0f9edb