Project Gardener CVE-2025-59823: Brief Summary of Critical Code Injection in Multi-Cloud Kubernetes Extensions

This post provides a brief summary of CVE-2025-59823, a critical code injection vulnerability in Project Gardener's cloud provider extensions for AWS, Azure, OpenStack, and GCP. The vulnerability allows administrative users to inject code during infrastructure provisioning, potentially compromising seed clusters and all managed shoot clusters. Specific affected versions, technical details, and references are included.
CVE Analysis

8 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-09-25

Project Gardener CVE-2025-59823: Brief Summary of Critical Code Injection in Multi-Cloud Kubernetes Extensions
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A single misconfigured extension in a Kubernetes management platform can lead to compromise of entire cloud estates. Project Gardener, a widely adopted open-source system for automating Kubernetes cluster operations across multiple clouds, recently disclosed a critical code injection vulnerability in its provider extensions. This issue impacts AWS, Azure, OpenStack, and GCP integrations, and could allow attackers with administrative project access to take control of seed clusters and all managed shoot clusters.

About Project Gardener: Project Gardener is an open-source Kubernetes cluster management platform originally developed by SAP and now part of the Cloud Native Computing Foundation (CNCF). It enables organizations to automate the lifecycle of Kubernetes clusters across AWS, Azure, GCP, OpenStack, and other providers. Gardener is used by enterprises seeking multi-cloud flexibility and consistent cluster operations at scale.

Technical Information

CVE-2025-59823 is a code injection vulnerability (CWE-94) affecting Gardener's cloud provider extensions for AWS, Azure, OpenStack, and GCP. The flaw is present in the way these extensions handle user-supplied configuration data (specifically the providerConfig field in Infrastructure resources) before passing it to the Terraformer component.

Terraformer is responsible for provisioning cloud infrastructure using Terraform. The vulnerable extensions do not adequately sanitize or validate the providerConfig input, allowing an attacker with administrative privileges in a Gardener project to inject arbitrary code. When Terraformer processes this input, it executes the injected code with the privileges of the seed cluster, which manages all associated shoot clusters.

Root cause:

  • Insufficient input validation and sanitization of providerConfig in Infrastructure resources by extension controllers.
  • Direct passing of user-controlled configuration to Terraformer, which then executes it as part of the infrastructure provisioning process.

Impact:

  • Full compromise of the seed cluster is possible.
  • All shoot clusters managed by the compromised seed can be affected.
  • The attack requires administrative privileges within a Gardener project, but these are commonly assigned in enterprise environments.

No public code snippets or vulnerable code lines are available in advisories or release notes. The vulnerability is systemic to the extension architecture and Terraformer integration.

Affected Systems and Versions

  • Gardener Extension Provider AWS: All versions before 1.64.0
  • Gardener Extension Provider Azure: All versions before 1.55.0
  • Gardener Extension Provider OpenStack: All versions before 1.49.0
  • Gardener Extension Provider GCP: All versions before 1.46.0

Vulnerable configurations:

  • Any Gardener installation using Terraformer for infrastructure provisioning with the above provider extensions.

Vendor Security History

Project Gardener has previously addressed privilege escalation and extension-related vulnerabilities, including:

  • CVE-2025-47283: Project secret validation bypass leading to privilege escalation.
  • CVE-2025-47284: Issues in the gardenlet component affecting cluster management.

The vendor has demonstrated responsible disclosure and coordinated patching across all affected extensions, indicating a mature and responsive security process.

References

Detect & fix
what others miss