{"api_version":"1","generated_at":"2026-04-09T04:32:03+00:00","cve":"CVE-2026-39429","urls":{"html":"https://cve.report/CVE-2026-39429","api":"https://cve.report/api/cve/CVE-2026-39429.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-39429","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-39429"},"summary":{"title":"kcp's cache server is accessible without authentication or authorization checks","description":"kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.30.3 and 0.29.3, the cache server is directly exposed by the root shard and has no authentication or authorization in place. This allows anyone who can access the root shard to read and write to the cache server. This vulnerability is fixed in 0.30.3 and 0.29.3.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-08 21:16:59","updated_at":"2026-04-08 21:26:13"},"problem_types":["CWE-302","CWE-862","CWE-862 CWE-862: Missing Authorization","CWE-302 CWE-302: Authentication Bypass by Assumed-Immutable Data"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/kcp-dev/kcp/security/advisories/GHSA-3j3q-wp9x-585p","name":"https://github.com/kcp-dev/kcp/security/advisories/GHSA-3j3q-wp9x-585p","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/kcp-dev/kcp/releases/tag/v0.29.3","name":"https://github.com/kcp-dev/kcp/releases/tag/v0.29.3","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/kcp-dev/kcp/releases/tag/v0.30.3","name":"https://github.com/kcp-dev/kcp/releases/tag/v0.30.3","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-39429","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-39429","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"kcp-dev","product":"kcp","version":"affected >= 0.30.0, < 0.30.3","platforms":[]},{"source":"CNA","vendor":"kcp-dev","product":"kcp","version":"affected < 0.29.3","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"kcp","vendor":"kcp-dev","versions":[{"status":"affected","version":">= 0.30.0, < 0.30.3"},{"status":"affected","version":"< 0.29.3"}]}],"descriptions":[{"lang":"en","value":"kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.30.3 and 0.29.3, the cache server is directly exposed by the root shard and has no authentication or authorization in place. This allows anyone who can access the root shard to read and write to the cache server. This vulnerability is fixed in 0.30.3 and 0.29.3."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-862","description":"CWE-862: Missing Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-302","description":"CWE-302: Authentication Bypass by Assumed-Immutable Data","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T20:16:04.015Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/kcp-dev/kcp/security/advisories/GHSA-3j3q-wp9x-585p","tags":["x_refsource_CONFIRM"],"url":"https://github.com/kcp-dev/kcp/security/advisories/GHSA-3j3q-wp9x-585p"},{"name":"https://github.com/kcp-dev/kcp/releases/tag/v0.29.3","tags":["x_refsource_MISC"],"url":"https://github.com/kcp-dev/kcp/releases/tag/v0.29.3"},{"name":"https://github.com/kcp-dev/kcp/releases/tag/v0.30.3","tags":["x_refsource_MISC"],"url":"https://github.com/kcp-dev/kcp/releases/tag/v0.30.3"}],"source":{"advisory":"GHSA-3j3q-wp9x-585p","discovery":"UNKNOWN"},"title":"kcp's cache server is accessible without authentication or authorization checks"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-39429","datePublished":"2026-04-08T20:16:04.015Z","dateReserved":"2026-04-07T00:23:30.596Z","dateUpdated":"2026-04-08T20:16:04.015Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-08 21:16:59","lastModifiedDate":"2026-04-08 21:26:13","problem_types":["CWE-302","CWE-862","CWE-862 CWE-862: Missing Authorization","CWE-302 CWE-302: Authentication Bypass by Assumed-Immutable Data"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"39429","Ordinal":"1","Title":"kcp's cache server is accessible without authentication or autho","CVE":"CVE-2026-39429","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"39429","Ordinal":"1","NoteData":"kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.30.3 and 0.29.3, the cache server is directly exposed by the root shard and has no authentication or authorization in place. This allows anyone who can access the root shard to read and write to the cache server. This vulnerability is fixed in 0.30.3 and 0.29.3.","Type":"Description","Title":"kcp's cache server is accessible without authentication or autho"}]}}}