Observability Operator is vulnerable to Incorrect Privilege Assignment through its Custom Resource MonitorStack
High severity
GitHub Reviewed
Published
Nov 12, 2025
to the GitHub Advisory Database
•
Updated Nov 14, 2025
Package
Affected versions
< 1.3.0
Patched versions
1.3.0
Description
Published by the National Vulnerability Database
Nov 12, 2025
Published to the GitHub Advisory Database
Nov 12, 2025
Reviewed
Nov 14, 2025
Last updated
Nov 14, 2025
A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with ClusterRole upon deployment of the Namespace-Scoped Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.
References