CVE-2021-32690
Helm vulnerability analysis and mitigation

Overview

A vulnerability was discovered in Helm (CVE-2021-32690) where username and password credentials associated with a Helm repository could be inadvertently passed to another domain referenced by that repository. The issue was discovered by a Helm core maintainer and was disclosed on June 16, 2021, affecting Helm versions 3.6.0 and earlier (GitHub Advisory).

Technical details

The vulnerability exists in the way Helm handles credentials when accessing chart repositories. When an index.yaml file within a Helm chart repository contains references to chart archives on different domains, the authentication credentials intended for the primary repository were being passed to these secondary domains during chart retrieval operations. This behavior occurred automatically without user awareness (GitHub Advisory).

Impact

When a username and password were associated with a Helm repository, these credentials were unintentionally transmitted to other domains referenced in the index.yaml file during chart archive retrieval. This could potentially lead to credential exposure to unauthorized domains (GitHub Advisory).

Mitigation and workarounds

The issue was patched in Helm version 3.6.1. The fix includes a behavior change where credentials are only passed to the URL location of the Helm repository by default, scoped to the scheme, host, and port of the repository. For cases where credential passing to other domains is required, a new --pass-credentials flag was introduced as an opt-in feature. Users can audit their Helm repositories to check for other domains in the index.yaml file that might have received credentials (GitHub Release, GitHub Advisory).

Community reactions

The release of Helm 3.6.1 received positive community engagement, with numerous GitHub users reacting to the security release announcement. The community acknowledged the importance of this security fix, as evidenced by the 119 thumbs up reactions and 35 celebration reactions on the release announcement (GitHub Release).

Additional resources


SourceThis report was generated using AI

Related Helm vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61725HIGH7.5
  • cAdvisorcAdvisor
  • cluster-api-helm-controller
NoYesOct 29, 2025
CVE-2024-25621HIGH7.3
  • HelmHelm
  • cert-manager-cmctl
NoYesNov 06, 2025
CVE-2025-64329MEDIUM6.9
  • HelmHelm
  • opa-envoy
NoYesNov 07, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • cloud-provider-aws-fips-1.30
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • kyverno-policy-reporter-fips
NoYesNov 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management