CVE-2025-47282: Gardener External DNS Management allows malicious google credential in DNS secret to lead to privilege escalation
9.9
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.31751%
CWE
Published
5/19/2025
Updated
5/19/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/gardener/external-dns-management | go | < 0.23.6 | 0.23.6 |
| github.com/gardener/gardener-extension-shoot-dns-service | go | <= 1.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability allows privilege escalation through malicious Google Cloud credentials in a DNS secret. The fix, identified in commit 4cd7f49a9e548bc32ef573be2114c547c3d3f946, introduces validation for the 'project_id' within the service account JSON. The function NewHandler in pkg/controller/provider/google/handler.go was modified to incorporate this validation. Before this patch, NewHandler would process the service account JSON without this specific validation, making it the function that handles the potentially malicious input and is therefore vulnerable. The newly added function validateServiceAccountJSON is part of the mitigation, not the vulnerable code itself.