Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/fluxcd/notification-controller
  4. ›
  5. CVE-2026-40109

CVE-2026-40109: Flux notification-controller GCR Receiver missing email validation allows unauthorized reconciliation triggering

April 10, 2026

The gcr Receiver type in Flux notification-controller does not validate the email claim of Google OIDC tokens used for Pub/Sub push authentication. This allows any valid Google-issued token, to authenticate against the Receiver webhook endpoint, triggering unauthorized Flux reconciliations.

Exploitation requires the attacker to know the Receiver’s webhook URL. The webhook path is generated as /hook/sha256sum(token+name+namespace), where the token is a random string stored in a Kubernetes Secret. There is no API or endpoint that enumerates webhook URLs. An attacker cannot discover the path without either having access to the cluster and permissions to read the Receiver’s .status.webhookPath in the target namespace, or obtaining the URL through other means (e.g. leaked secrets or access to Pub/Sub config).

Upon successful authentication, the controller triggers a reconciliation for all resources listed in the Receiver’s .spec.resources. However, the practical impact is limited: Flux reconciliation is idempotent, so if the desired state in the configured sources (Git, OCI, Helm) has not changed, the reconciliation results in a no-op with no effect on cluster state. Additionally, Flux controllers deduplicate reconciliation requests, sending many requests in a short period results in only a single reconciliation being processed.

References

  • github.com/advisories/GHSA-h9cx-xjg6-5v2w
  • github.com/fluxcd/notification-controller
  • github.com/fluxcd/notification-controller/pull/1279
  • github.com/fluxcd/notification-controller/releases/tag/v1.8.3
  • github.com/fluxcd/notification-controller/security/advisories/GHSA-h9cx-xjg6-5v2w
  • nvd.nist.gov/vuln/detail/CVE-2026-40109

Code Behaviors & Features

Detect and mitigate CVE-2026-40109 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.8.3

Fixed versions

  • 1.8.3

Solution

Upgrade to version 1.8.3 or above.

Impact 3.1 LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication
  • CWE-345: Insufficient Verification of Data Authenticity

Source file

go/github.com/fluxcd/notification-controller/CVE-2026-40109.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 16 Apr 2026 12:20:07 +0000.