Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2026-32737

Romeo gives the capability to reach high code coverage of Go ≥1.20 apps by helping to measure code coverage for functional and integration tests within GitHub Actions. Prior to version 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from the "hardened" namespace to any Pod out of it. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. Removing the `inter-ns` NetworkPolicy patches the vulnerability in version 0.2.1. If updates are not possible in production environments, manually delete `inter-ns` and update as soon as possible. Given one's context, delete the failing network policy that should be prefixed by `inter-ns-` in the target namespace.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 6.2%
CVSS Severity
CVSS v3 Score 10.0
Products affected by CVE-2026-32737
  • Ctfer-Io » Romeo » Version: 0.1.0
    cpe:2.3:a:ctfer-io:romeo:0.1.0
  • Ctfer-Io » Romeo » Version: 0.1.1
    cpe:2.3:a:ctfer-io:romeo:0.1.1
  • Ctfer-Io » Romeo » Version: 0.1.2
    cpe:2.3:a:ctfer-io:romeo:0.1.2
  • Ctfer-Io » Romeo » Version: 0.1.3
    cpe:2.3:a:ctfer-io:romeo:0.1.3
  • Ctfer-Io » Romeo » Version: 0.1.4
    cpe:2.3:a:ctfer-io:romeo:0.1.4
  • Ctfer-Io » Romeo » Version: 0.1.5
    cpe:2.3:a:ctfer-io:romeo:0.1.5
  • Ctfer-Io » Romeo » Version: 0.1.6
    cpe:2.3:a:ctfer-io:romeo:0.1.6
  • Ctfer-Io » Romeo » Version: 0.1.7
    cpe:2.3:a:ctfer-io:romeo:0.1.7
  • Ctfer-Io » Romeo » Version: 0.1.8
    cpe:2.3:a:ctfer-io:romeo:0.1.8
  • Ctfer-Io » Romeo » Version: 0.1.9
    cpe:2.3:a:ctfer-io:romeo:0.1.9
  • Ctfer-Io » Romeo » Version: 0.2.0
    cpe:2.3:a:ctfer-io:romeo:0.2.0


Contact Us

Shodan ® - All rights reserved