Kubernetes Kustomization Configuration Detected

high Web App Scanning Plugin ID 115127

Synopsis

Kubernetes Kustomization Configuration Detected

Description

`kustomization.yml` is a configuration file used by Kustomize, a tool for customizing Kubernetes resource configurations. This file can contain sensitive information such as resource definitions, patches, and overlays that could be exploited by attackers if exposed publicly.

If an attacker gains access to the `kustomization.yml` file, they could potentially manipulate Kubernetes resources, leading to unauthorized access, data breaches, or service disruptions within the Kubernetes cluster.

Solution

Ensure that the `kustomization.yml` configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.

See Also

https://kubernetes.io/docs/tasks/manage-kubernetes-objects/kustomization/

Plugin Details

Severity: High

ID: 115127

Type: remote

Published: 2/3/2026

Updated: 2/3/2026

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: High

Base Score: 8.7

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information