Security for everyone

CVE-2023-22463 Scanner

Detects 'Admin Authentication Bypass' vulnerability in KubePi affects versions through 1.6.2.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2023-22463 Scanner Detail

KubePi is a modern, web-based interface for managing Kubernetes clusters, offering administrators and developers an intuitive platform to deploy, manage, and troubleshoot applications. It simplifies complex Kubernetes operations, making it easier to manage containerized applications across different environments. KubePi is designed for both small and large-scale deployments, providing a centralized point of control for Kubernetes clusters. Its user-friendly dashboard offers real-time insights into cluster performance, resource usage, and operational status. KubePi is widely adopted for its ease of use, flexibility, and comprehensive management features, serving as a critical tool for organizations leveraging Kubernetes for their cloud-native applications.

CVE-2023-22463 describes a critical Admin Authentication Bypass vulnerability in KubePi, affecting versions up to 1.6.2. This vulnerability stems from the use of hard-coded JwtSigKeys within the jwt authentication function, leading to identical JwtSigKeys across all deployments. This flaw allows attackers to forge jwt tokens and gain unauthorized access to administrator accounts on any KubePi instance, potentially leading to a full takeover of the underlying Kubernetes cluster. The vulnerability highlights the risk of using hard-coded secrets in authentication mechanisms and underscores the importance of secure configuration practices.

In affected versions of KubePi, the `session.go` file contains a hard-coded JwtSigKey, which is used for jwt token generation and validation. This lack of variability in the JwtSigKey means that an attacker who obtains the key from one instance of KubePi can generate valid jwt tokens, impersonating administrators on any other instance. This security oversight allows unauthorized access to administrative functionalities within KubePi, thereby compromising the security of the Kubernetes clusters it manages. The exploitation of this vulnerability requires no special privileges, making it a critical security issue that must be addressed promptly.

Exploiting this vulnerability could lead to a range of severe consequences, including unauthorized administrative access to KubePi interfaces, unauthorized control over Kubernetes clusters, potential data breach or loss, and disruption of cluster operations. Attackers could deploy malicious containers, alter cluster configurations, exfiltrate sensitive information, or perform a denial of service against the Kubernetes infrastructure. The breach of administrative boundaries posed by this vulnerability undermines the security and integrity of affected systems, leading to potentially significant impacts on the confidentiality, integrity, and availability of the Kubernetes environments managed via KubePi.

Joining the securityforeveryone platform equips users with advanced tools to detect and mitigate vulnerabilities like CVE-2023-22463 in KubePi. Our platform provides continuous monitoring, vulnerability assessment, and actionable remediation guidance to secure your digital infrastructure against current and emerging threats. Members benefit from comprehensive cybersecurity services designed to enhance organizational resilience, protect sensitive data, and maintain operational integrity. Embrace proactive security management with securityforeveryone and safeguard your Kubernetes clusters from sophisticated cyber threats.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture