| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-9524 | A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This flaw allows a user with full access to their namespace to extract the ServiceAccount token and use it to submit TokenReview and SubjectAccessReview requests, potentially revealing information about other users' permissions. While this does not allow privilege escalation or impersonation, it exposes information that could aid in gathering information for further attacks. |
Github GHSA |
GHSA-28gr-56hr-prp6 | Grafana Tempo Operator Vulnerable to Exposure of Sensitive Information to an Unauthorized Actor |
Solution
No solution given by the vendor.
Workaround
Currently, no mitigation is available for this vulnerability.
Sun, 22 Mar 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 09 Apr 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 04 Apr 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_distributed_tracing:3.5::el8 | |
| References |
|
Thu, 03 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Apr 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 02 Apr 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This flaw allows a user with full access to their namespace to extract the ServiceAccount token and use it to submit TokenReview and SubjectAccessReview requests, potentially revealing information about other users' permissions. While this does not allow privilege escalation or impersonation, it exposes information that could aid in gathering information for further attacks. | |
| Title | Tempo-operator: serviceaccount token exposure leading to token and subject access reviews in openshift tempo operator | |
| First Time appeared |
Redhat
Redhat openshift Distributed Tracing |
|
| Weaknesses | CWE-200 | |
| CPEs | cpe:/a:redhat:openshift_distributed_tracing:3 | |
| Vendors & Products |
Redhat
Redhat openshift Distributed Tracing |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-22T03:43:53.376Z
Reserved: 2025-03-25T10:51:16.783Z
Link: CVE-2025-2786
Updated: 2025-04-02T13:53:32.587Z
Status : Deferred
Published: 2025-04-02T11:15:39.300
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-2786
OpenCVE Enrichment
No data.
EUVD
Github GHSA