{"id":"CLEANSTART-2026-BM53321","summary":"attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing","details":"Multiple security vulnerabilities affect the kube-state-metrics package. An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. See references for individual vulnerability details.","modified":"2026-04-15T05:47:03.481814Z","published":"2026-04-10T00:51:58.426076Z","upstream":["CVE-2025-22868","CVE-2025-47911","CVE-2025-47913","CVE-2025-47914","CVE-2025-58181","CVE-2025-58183","CVE-2025-58185","CVE-2025-58187","CVE-2025-58188","CVE-2025-58189","CVE-2025-58190","CVE-2025-61723","CVE-2025-61724","CVE-2025-61725","CVE-2025-61726","CVE-2025-61727","CVE-2025-61728","CVE-2025-61729","CVE-2025-61730","CVE-2025-68121","CVE-2026-24051","CVE-2026-25679","CVE-2026-27139","CVE-2026-27142","CVE-2026-32280","CVE-2026-32281","CVE-2026-32282","CVE-2026-32283","CVE-2026-32289","CVE-2026-33186"],"database_specific":{},"references":[{"type":"ADVISORY","url":"https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BM53321.json"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-22868"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-47911"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-47913"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-47914"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-58181"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-58183"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-58185"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-58187"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-58188"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-58189"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-58190"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61723"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61724"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61725"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61726"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61727"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61728"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61729"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61730"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-68121"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-24051"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-25679"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-27139"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-27142"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-32280"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-32281"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-32282"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-32283"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-32289"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2026-33186"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22868"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-47911"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-47913"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-47914"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58181"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58183"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58185"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58187"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58188"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58189"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58190"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61723"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61724"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61725"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61726"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61727"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61728"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61729"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61730"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68121"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-24051"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25679"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27139"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27142"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32280"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32281"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32282"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32283"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32289"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33186"}],"affected":[{"package":{"name":"kube-state-metrics","ecosystem":"CleanStart"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.16.0-r3"}]}],"database_specific":{"source":"https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-BM53321.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}