CVE-2026-23634
low-risk
Published 2026-01-16
Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5.
Do I need to act?
-
0.01% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
Affected Products (1)
Pepr
Affected Vendors
References (2)
12
/ 100
low-risk
Severity
7/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal