Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

740+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-32604: Spinnaker Clouddriver Remote Code Execution (CVSS 9.9)
CVE-2026-32604: Spinnaker Clouddriver Remote Code Execution (CVSS 9.9)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-32604

CVE-2026-32604: Spinnaker Clouddriver Remote Code Execution (CVSS 9.9)

A critical unauthenticated RCE vulnerability in Spinnaker's clouddriver service allows attackers to execute arbitrary commands on clouddriver pods, exposing credentials and cloud infrastructure.

Dylan H.

Security Team

April 21, 2026
2 min read

Affected Products

  • Spinnaker clouddriver < 2026.1.0, < 2026.0.1, < 2025.4.2, < 2025.3.2

Overview

A critical remote code execution (RCE) vulnerability has been identified in Spinnaker's clouddriver service, the component responsible for cloud provider integrations including credential management for AWS, GCP, Azure, and other platforms. The flaw, tracked as CVE-2026-32604 with a CVSS score of 9.9, allows a bad actor to execute arbitrary OS-level commands directly on clouddriver pods with minimal effort.

Exploitation can result in exposure of cloud provider credentials, file deletion, resource injection, and full compromise of the CI/CD delivery pipeline.

Affected Versions

ComponentVulnerable Versions
Spinnaker clouddriverAll versions prior to 2026.1.0
Spinnaker clouddriverAll versions prior to 2026.0.1
Spinnaker clouddriverAll versions prior to 2025.4.2
Spinnaker clouddriverAll versions prior to 2025.3.2

Vulnerability Details

CVE ID: CVE-2026-32604
CVSS Score: 9.9 (Critical)
Attack Vector: Network
Authentication Required: None
Component: clouddriver (Spinnaker)

The vulnerability exists in the clouddriver service's handling of user-supplied input. Because clouddriver manages cloud provider authentication tokens and interacts with cloud APIs, a successful exploit grants an attacker access to all configured cloud credentials — including IAM roles, service account keys, and deployment pipelines.

Specific impact includes:

  • Arbitrary command execution on clouddriver Kubernetes pods
  • Credential exposure — cloud provider secrets, API keys, and tokens stored in clouddriver
  • File system manipulation — delete, overwrite, or create files within the pod
  • Resource injection — modify or inject cloud resources into managed accounts
  • Lateral movement — pivot from clouddriver into connected cloud environments

Timeline

DateEvent
2026-04-20CVE published to NVD
2026-04-21Spinnaker patched releases confirmed

Remediation

Patch immediately. Upgrade to one of the following fixed versions:

  • 2026.1.0 or later
  • 2026.0.1 or later
  • 2025.4.2 or later
  • 2025.3.2 or later

Patches are available via the official Spinnaker release channels and Helm chart repositories.

Immediate Mitigations

If patching is not immediately possible:

  1. Restrict network access to clouddriver — ensure it is not exposed externally and limit pod-to-pod communication via NetworkPolicy
  2. Audit cloud credentials — rotate all cloud provider credentials managed by clouddriver
  3. Review audit logs — check clouddriver logs for unusual command execution or API calls
  4. Enable Kubernetes RBAC — verify clouddriver's service account has least-privilege permissions

References

  • NVD Entry — CVE-2026-32604
  • Spinnaker GitHub Repository
#CVE#Cloud Security#Spinnaker#RCE#Critical

Related Articles

CVE-2026-32613: Spinnaker Echo Spring Expression Language Injection (CVSS 9.9)

A critical code injection flaw in Spinnaker's Echo service allows unrestricted Spring Expression Language (SPeL) execution via artifact processing, enabling full remote code execution on affected deployments.

4 min read

CVE-2026-39918: Vvveb CMS Unauthenticated PHP Code Injection via Install Endpoint

Vvveb CMS versions prior to 1.0.8.1 allow unauthenticated attackers to inject arbitrary PHP code through the installation endpoint's unsanitized subdir parameter, enabling full remote code execution.

4 min read

CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0

A critical unauthenticated remote code execution vulnerability (CVSS 9.8) in Oracle's Edge Cloud Infrastructure Designer and Visualisation Toolkit allows...

6 min read
Back to all Security Alerts