CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

cloudfoundry

cf-deployment

35 known vulnerabilities · sorted by CVSS score

CVE-2019-3801
CRITICAL9.8

Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.

cloudfoundry / cf-deployment+3
Network
Published Apr 25, 2019
Page 1 of 2
CVE-2022-31733
CRITICAL9.1

Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is enabled AND unproxied ports are turned off, then an attacker could connect to an application that should be only reachable via mTLS, without presenting a client certificate.

cloudfoundry / cf-deployment+1
Network
Published Feb 3, 2023
CVE-2020-5402
HIGH8.8

In Cloud Foundry UAA, versions prior to 74.14.0, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function when authenticating with external identity providers.

cloudfoundry / cf-deployment+1
Network
Published Feb 27, 2020
CVE-2020-5417
HIGH8.8

Cloud Foundry CAPI (Cloud Controller), versions prior to 1.97.0, when used in a deployment where an app domain is also the system domain (which is true in the default CF Deployment manifest), were vulnerable to developers maliciously or accidentally claiming certain sensitive routes, potentially resulting in the developer's app handling some requests that were expected to go to certain system components.

cloudfoundry / capi-release+1
Network
Published Aug 21, 2020
CVE-2018-1195
HIGH8.8

In Cloud Controller versions prior to 1.46.0, cf-deployment versions prior to 1.3.0, and cf-release versions prior to 283, Cloud Controller accepts refresh tokens for authentication where access tokens are expected. This exposes a vulnerability where a refresh token that would otherwise be insufficient to obtain an access token, either due to lack of client credentials or revocation, would allow authentication.

cloudfoundry / capi-release+2
Network
Published Mar 19, 2018
CVE-2018-1191
HIGH8.8

Cloud Foundry Garden-runC, versions prior to 1.11.0, contains an information exposure vulnerability. A user with access to Garden logs may be able to obtain leaked credentials and perform authenticated actions using those credentials.

cloudfoundry / cf-deployment+1
Network
Published Mar 29, 2018
CVE-2019-11283
HIGH8.8

Cloud Foundry SMB Volume, versions prior to v2.0.3, accidentally outputs sensitive information to the logs. A remote user with access to the SMB Volume logs can discover the username and password for volumes that have been recently created, allowing the user to take control of the SMB Volume.

cloudfoundry / cf-deployment+1
Network
Published Oct 23, 2019
CVE-2019-11289
HIGH8.6

Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthenticated malicious user could forge an HTTP route service request using an invalid nonce that will cause the Gorouter to crash.

cloudfoundry / cf-deployment+1
Network
Published Nov 19, 2019
CVE-2019-11277
HIGH8.1

Cloud Foundry NFS Volume Service, 1.7.x versions prior to 1.7.11 and 2.x versions prior to 2.3.0, is vulnerable to LDAP injection. A remote authenticated malicious space developer can potentially inject LDAP filters via service instance creation, facilitating the malicious space developer to deny service or perform a dictionary attack.

cloudfoundry / cf-deployment+2
Network
Published Sep 23, 2019
CVE-2018-1221
HIGH8.1

In cf-deployment before 1.14.0 and routing-release before 0.172.0, the Cloud Foundry Gorouter mishandles WebSocket requests for AWS Application Load Balancers (ALBs) and some other HTTP-aware Load Balancers. A user with developer privileges could use this vulnerability to steal data or cause denial of service.

cloudfoundry / cf-deployment+1
Network
Published Mar 19, 2018
CVE-2023-20881
HIGH8.1

Cloud foundry instances having CAPI version between 1.140 and 1.152.0 along with loggregator-agent v7+ may override other users syslog drain credentials if they're aware of the client certificate used for that syslog drain. This applies even if the drain has zero certs. This would allow the user to override the private key and add or modify a certificate authority used for the connection.

cloudfoundry / capi-release+2
Network
Published May 19, 2023
CVE-2020-5420
HIGH7.7

Cloud Foundry Routing (Gorouter) versions prior to 0.206.0 allow a malicious developer with "cf push" access to cause denial-of-service to the CF cluster by pushing an app that returns specially crafted HTTP responses that crash the Gorouters.

cloudfoundry / cf-deployment+1
Network
Published Sep 3, 2020
CVE-2021-22001
HIGH7.5

In UAA versions prior to 75.3.0, sensitive information like relaying secret of the provider was revealed in response when deletion request of an identity provider( IdP) of type “oauth 1.0” was sent to UAA server.

cloudfoundry / cf-deployment+1
Network
Published Jul 22, 2021
CVE-2019-11290
HIGH7.5

Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.

cloudfoundry / cf-deployment+1
Network
Published Nov 26, 2019
CVE-2021-22101
HIGH7.5

Cloud Controller versions prior to 1.118.0 are vulnerable to unauthenticated denial of Service(DoS) vulnerability allowing unauthenticated attackers to cause denial of service by using REST HTTP requests with label_selectors on multiple V3 endpoints by generating an enormous SQL query.

cloudfoundry / capi-release+1
Network
Published Oct 27, 2021
CVE-2020-5423
HIGH7.5

CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.

cloudfoundry / capi-release+1
Network
Published Dec 2, 2020
CVE-2018-1262
HIGH7.2

Cloud Foundry Foundation UAA, versions 4.12.X and 4.13.X, introduced a feature which could allow privilege escalation across identity zones for clients performing offline validation. A zone administrator could configure their zone to issue tokens which impersonate another zone, granting up to admin privileges in the impersonated zone for clients performing offline token validation.

pivotal_software / cloud_foundry_uaa+11
Network
Published May 15, 2018
CVE-2018-1265
HIGH7.2

Cloud Foundry Diego, release versions prior to 2.8.0, does not properly sanitize file paths in tar and zip files headers. A remote attacker with CF admin privileges can upload a malicious buildpack that will allow a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell.

cloudfoundry / cf-deployment+1
Network
Published Jun 6, 2018
CVE-2020-5400
MEDIUM6.5

Cloud Foundry Cloud Controller (CAPI), versions prior to 1.91.0, logs properties of background jobs when they are run, which may include sensitive information such as credentials if provided to the job. A malicious user with access to those logs may gain unauthorized access to resources protected by such credentials.

cloudfoundry / capi-release+1
Network
Published Feb 27, 2020
CVE-2021-22115
MEDIUM6.5

Cloud Controller API versions prior to 1.106.0 logs service broker credentials if the default value of db logging config field is changed. CAPI database logs service broker password in plain text whenever a job to clean up orphaned items is run by Cloud Controller.

cloudfoundry / capi-release+1
Network
Published Apr 8, 2021