CVE-2026-23742

high

Description

Skipper is an HTTP router and reverse proxy for service composition. The default skipper configuration before 0.23.0 was -lua-sources=inline,file. The problem starts if untrusted users can create lua filters, because of -lua-sources=inline , for example through a Kubernetes Ingress resource. The configuration inline allows these user to create a script that is able to read the filesystem accessible to the skipper process and if the user has access to read the logs, they an read skipper secrets. This vulnerability is fixed in 0.23.0.

References

https://github.com/zalando/skipper/security/advisories/GHSA-cc8m-98fm-rc9g

https://github.com/zalando/skipper/releases/tag/v0.23.0

https://github.com/zalando/skipper/commit/0b52894570773b29e2f3c571b94b4211ef8fa714

Details

Source: Mitre, NVD

Published: 2026-01-16

Updated: 2026-01-16

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00041