Improper access control in etcd - CVE-2026-33413
Published: May 5, 2026
etcd
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass authorization checks and invoke restricted etcd API functions.
The vulnerability exists due to improper access control in the gRPC API layer when handling gRPC API requests from untrusted or partially trusted clients. A remote attacker can call MemberList, Alarm, Lease APIs, or trigger compaction to bypass authorization checks and invoke restricted etcd API functions.
The issue is exposed in clusters with etcd auth enabled that expose the gRPC API to untrusted or partially trusted clients.