kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes.
Exploitability
AV:NAC:LPR:HUI:NScope
S:CImpact
C:NI:LA:N4.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:NOther