Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-4qqj-251q-ykek
Summary
Confused Deputy in Kubernetes
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.
Aliases
0
alias CVE-2021-25740
1
alias GHSA-vw47-mr44-3jf9
Fixed_packages
0
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-42kp-8t9h-dfat
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1%3Fdistro=trixie
1
url pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/kubernetes@1.20.5%2Breally1.20.2-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.20.5%252Breally1.20.2-1.1%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
purl pkg:deb/debian/kubernetes@1.32.3%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.32.3%252Bds-2%3Fdistro=trixie
3
url pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.33.4%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/kubernetes@1.33.4%252Bds-1%3Fdistro=trixie
Affected_packages
0
url pkg:alpm/archlinux/kube-proxy@1.23.0-1
purl pkg:alpm/archlinux/kube-proxy@1.23.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4qqj-251q-ykek
1
vulnerability VCID-vu3k-upyc-x7av
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/kube-proxy@1.23.0-1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25740.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25740
reference_id
reference_type
scores
0
value 0.00519
scoring_system epss
scoring_elements 0.66824
published_at 2026-04-21T12:55:00Z
1
value 0.00519
scoring_system epss
scoring_elements 0.66849
published_at 2026-04-24T12:55:00Z
2
value 0.00685
scoring_system epss
scoring_elements 0.71673
published_at 2026-04-13T12:55:00Z
3
value 0.00685
scoring_system epss
scoring_elements 0.71692
published_at 2026-04-12T12:55:00Z
4
value 0.00685
scoring_system epss
scoring_elements 0.71708
published_at 2026-04-11T12:55:00Z
5
value 0.00685
scoring_system epss
scoring_elements 0.71685
published_at 2026-04-09T12:55:00Z
6
value 0.00685
scoring_system epss
scoring_elements 0.71674
published_at 2026-04-08T12:55:00Z
7
value 0.00685
scoring_system epss
scoring_elements 0.71637
published_at 2026-04-01T12:55:00Z
8
value 0.00685
scoring_system epss
scoring_elements 0.71634
published_at 2026-04-07T12:55:00Z
9
value 0.00685
scoring_system epss
scoring_elements 0.71644
published_at 2026-04-02T12:55:00Z
10
value 0.00685
scoring_system epss
scoring_elements 0.71662
published_at 2026-04-04T12:55:00Z
11
value 0.00685
scoring_system epss
scoring_elements 0.71723
published_at 2026-04-18T12:55:00Z
12
value 0.00685
scoring_system epss
scoring_elements 0.71717
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25740
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kubernetes/kubernetes
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes
5
reference_url https://github.com/kubernetes/kubernetes/issues/103675
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/kubernetes/kubernetes/issues/103675
6
reference_url https://groups.google.com/g/kubernetes-security-announce/c/WYE9ptrhSLE
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/kubernetes-security-announce/c/WYE9ptrhSLE
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-25740
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-25740
8
reference_url https://security.netapp.com/advisory/ntap-20211014-0001
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20211014-0001
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1982470
reference_id 1982470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1982470
10
reference_url https://security.archlinux.org/AVG-1915
reference_id AVG-1915
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1915
Weaknesses
0
cwe_id 441
name Unintended Proxy or Intermediary ('Confused Deputy')
description The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.
1
cwe_id 610
name Externally Controlled Reference to a Resource in Another Sphere
description The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
2
cwe_id 863
name Incorrect Authorization
description The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Exploits
Severity_range_score0.1 - 3.1
Exploitability0.5
Weighted_severity2.8
Risk_score1.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-4qqj-251q-ykek