CVE-2023-3893 – github.com/kubernetes-csi/csi-proxy/v2
Package
Manager: go
Name: github.com/kubernetes-csi/csi-proxy/v2
Vulnerable Version: =2.0.0-alpha.0 || >=2.0.0-alpha.0 <2.0.0-alpha.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.03252 pctl0.86646
Details
Kubernetes csi-proxy vulnerable to privilege escalation due to improper input validation Kubernetes is vulnerable to privilege escalation when a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.
Metadata
Created: 2023-11-03T18:30:24Z
Modified: 2025-07-09T15:32:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-r6cc-7wj7-gfx2/GHSA-r6cc-7wj7-gfx2.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-r6cc-7wj7-gfx2
Finding: F184
Auto approve: 1