Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2023-32199

CVE-2023-32199: Rancher user retains access to clusters despite Global Role removal

October 24, 2025 (updated October 29, 2025)

A vulnerability has been identified within Rancher Manager, where after removing a custom GlobalRole that gives administrative access or the corresponding binding, the user still retains access to clusters. This only affects custom Global Roles that:

  • Have a * on * in * rule for resources
  • Have a * on * rule for non-resource URLs

For example

apiVersion: management.cattle.io/v3
kind: GlobalRole
metadata:
name: custom-admin
rules:
- apiGroups:
- '*'
resources:
- '*'
verbs:
- '*'
- nonResourceURLs:
- '*'
verbs:
- '*'

Specifically:

  • When a user is bound to a custom admin GlobalRole, a corresponding ClusterRoleBinding is created on all clusters that binds them to the cluster-admin ClusterRole.
  • When such a GlobalRole or the GlobalRoleBinding (e.g., when the user is unassigned from this role in UI) is deleted, the ClusterRoleBinding that binds them to the cluster-admin ClusterRole stays behind.

This issue allows a user to continue having access to clusters after they have been unassigned from the custom admin global role or the role has been deleted.

Please consult the associated MITRE ATT&CK - Technique - Account Access Removal for further information about this category of attack.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32199
  • github.com/advisories/GHSA-j4vr-pcmw-hx59
  • github.com/rancher/rancher
  • github.com/rancher/rancher/pull/52303
  • github.com/rancher/rancher/security/advisories/GHSA-j4vr-pcmw-hx59
  • nvd.nist.gov/vuln/detail/CVE-2023-32199

Code Behaviors & Features

Detect and mitigate CVE-2023-32199 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20251014212116-7faa74a968c2

Fixed versions

  • 0.0.0-20251014212116-7faa74a968c2

Solution

Upgrade to version 0.0.0-20251014212116-7faa74a968c2 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-281: Improper Preservation of Permissions

Source file

go/github.com/rancher/rancher/CVE-2023-32199.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 07 Nov 2025 12:20:00 +0000.