{"schema_version":"1.7.3","id":"GHSA-77v3-r3jw-j2v2","published":"2026-01-20T16:37:18Z","modified":"2026-04-16T02:14:29.314586906Z","aliases":["CVE-2026-22822","GO-2026-4330"],"summary":"External Secrets Operator insecurely retrieves secrets through the getSecretKey templating function","details":"### Summary\n\nThe `getSecretKey` template function, while introduced for senhasegura Devops Secrets Management (DSM) provider, has the ability to fetch secrets cross-namespaces with the roleBinding of the external-secrets controller, bypassing our security mechanisms.\n\nThis function was completely removed, as everything done with that templating function can be done in a different way while respecting our safeguards (for example, using `sourceRef` like explained here: https://github.com/external-secrets/external-secrets/issues/5690#issuecomment-3630977865)\n\n### Impact\n- Cross-namespace secret access: Attackers or misconfigured resources could retrieve secrets from namespaces other than the one intended.\n- privilege escalation: Unauthorized access to secrets could lead to privilege escalation, data exfiltration, or compromise of service accounts and credentials.\n\n### Resolution\n\nWe removed the incriminated templating function from our codebase. All users should upgrade to the latest version containing this fix.\n\n### Workarounds\n\nUse a policy engine such as Kubernetes, Kyverno, Kubewarden, or OPA to prevent the usage of `getSecretKey` in any ExternalSecret resource.\n\n### Details\n\nSee also:\n- https://github.com/external-secrets/external-secrets/issues/5690\n- https://github.com/external-secrets/external-secrets/pull/3895","affected":[{"package":{"name":"github.com/external-secrets/external-secrets","ecosystem":"Go","purl":"pkg:golang/github.com/external-secrets/external-secrets"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.20.2"},{"fixed":"1.2.0"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-77v3-r3jw-j2v2/GHSA-77v3-r3jw-j2v2.json"}}],"references":[{"type":"WEB","url":"https://github.com/external-secrets/external-secrets/security/advisories/GHSA-77v3-r3jw-j2v2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-22822"},{"type":"WEB","url":"https://github.com/external-secrets/external-secrets/issues/5690"},{"type":"WEB","url":"https://github.com/external-secrets/external-secrets/pull/3895"},{"type":"WEB","url":"https://github.com/external-secrets/external-secrets/commit/17d3e22b8d3fbe339faf8515a95ec06ec92b1feb"},{"type":"PACKAGE","url":"https://github.com/external-secrets/external-secrets"},{"type":"WEB","url":"https://github.com/external-secrets/external-secrets/releases/tag/v1.2.0"}],"database_specific":{"cwe_ids":["CWE-863"],"github_reviewed":true,"github_reviewed_at":"2026-01-20T16:37:18Z","nvd_published_at":"2026-01-21T22:15:49Z","severity":"CRITICAL"},"severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"}]}