{"id":"CVE-2025-64171","summary":"MARIN3R: Cross-Namespace Vulnerability in the Operator","details":"MARIN3R is a lightweight, CRD based envoy control plane for kubernetes. In versions 0.13.3 and below, there is a cross-namespace secret access vulnerability in the project's DiscoveryServiceCertificate which allows users to bypass RBAC and access secrets in unauthorized namespaces. This issue is fixed in version 0.13.4.","aliases":["GHSA-gf93-xccm-5g6j","GO-2025-4093"],"modified":"2026-04-10T05:34:28.483323Z","published":"2025-11-06T00:23:48.695Z","database_specific":{"cwe_ids":["CWE-862"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64171.json"},"references":[{"type":"ADVISORY","url":"https://github.com/3scale-sre/marin3r/security/advisories/GHSA-gf93-xccm-5g6j"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64171.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-64171"},{"type":"FIX","url":"https://github.com/3scale-sre/marin3r/commit/859b14115fde1d67620e645cd1b62e90e30d9981"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/3scale-sre/marin3r","events":[{"introduced":"0"},{"fixed":"b7ddd1cd07f736f86e6b9e5391b55627e077b10b"}]}],"versions":["api/v0.13.2","api/v0.13.3","v0.1.0","v0.1.1","v0.1.2","v0.1.3","v0.1.4","v0.10.0","v0.11.0","v0.11.1","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.13.0","v0.13.1","v0.13.2","v0.13.3","v0.2.0","v0.5.0","v0.6.0","v0.7.0-alpha6","v0.8.0","v0.9.0","v0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64171.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}]}