Go.Etcd.Io Etcd V3 vulnerabilities
7 known vulnerabilities affecting go.etcd.io/etcd_v3.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4MEDIUM2LOW1
Vulnerabilities
Page 1 of 1
CVE-2026-33413HIGH≥ 3.6.0-alpha.0, < 3.6.9≥ 3.5.0-alpha.0, < 3.5.28+1 more2026-03-20
CVE-2026-33413 [HIGH] CWE-862 etcd: Authorization bypasses in multiple APIs
etcd: Authorization bypasses in multiple APIs
### Impact
_What kind of vulnerability is it? Who is impacted?_
Multiple vulnerabilities allow unauthorized users to bypass authentication or authorization checks and call certain etcd functions in clusters that expose the gRPC API to untrusted or partially trusted clients.
In unpatched etcd clusters with etcd auth enabled, unauthorized users are able to:
- call MemberLis
ghsaosv
CVE-2026-33343LOW≥ 3.6.0-alpha.0, < 3.6.9≥ 3.5.0-alpha.0, < 3.5.28+1 more2026-03-20
CVE-2026-33343 [LOW] CWE-863 etcd: Nested etcd transactions bypass RBAC authorization checks
etcd: Nested etcd transactions bypass RBAC authorization checks
### Impact
_What kind of vulnerability is it? Who is impacted?_
An authenticated user with RBAC restricted permissions on key ranges can use nested transactions to bypass all key-level authorization. This allows any authenticated user with direct access to etcd to effectively ignore all key range restrictions, accessing the entire etcd dat
ghsaosv
CVE-2022-34038HIGH≥ 0, < 3.5.52023-08-22
CVE-2022-34038 [HIGH] CWE-787 etcd denial of service vulnerability
etcd denial of service vulnerability
Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go
ghsa
CVE-2020-15112MEDIUM≥ 0, < 3.3.23≥ 3.4.0, < 3.4.102022-10-06
CVE-2020-15112 [MEDIUM] CWE-129 etcd's WAL `ReadAll` method vulnerable to an entry with large index causing panic
etcd's WAL `ReadAll` method vulnerable to an entry with large index causing panic
### Vulnerability type
Data Validation
### Detail
In the ReadAll method in wal/wal.go, it is possible to have an entry index greater then the number of entries. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go down from a run
ghsa
CVE-2020-15106MEDIUM≥ 0, < 3.3.23≥ 3.4.0, < 3.4.102022-10-06
CVE-2020-15106 [MEDIUM] etcd's WAL `ReadAll` method vulnerable to an entry with large index causing panic
etcd's WAL `ReadAll` method vulnerable to an entry with large index causing panic
### Vulnerability type
Data Validation
### Detail
In the ReadAll method in wal/wal.go, it is possible to have an entry index greater then the number of entries. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go down from a runtime pan
osv
CVE-2018-16886HIGH≥ 3.2.0, < 3.2.26≥ 3.3.0, < 3.3.112022-04-12
CVE-2018-16886 [HIGH] CWE-285 go.etcd.io/etcd Authentication Bypass
go.etcd.io/etcd Authentication Bypass
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a RE
ghsaosv
CVE-2018-1098HIGH≥ 0, < 3.4.02022-02-15
CVE-2018-1098 [HIGH] CWE-352 etcd Cross-site Request Forgery (CSRF)
etcd Cross-site Request Forgery (CSRF)
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
ghsaosv