Pipelines privilege escalation happens when an attacker gains higher permissions inside CI/CD workflows, often moving from build access to full control of deployment environments. Once inside, escalation lets them run unauthorized code, access secrets, or change production without detection. The risk is amplified in complex pipelines that span multiple tools, repositories, and accounts.
The most common path is misconfigured permissions. Service accounts with more rights than needed, public runners that can trigger jobs, or environment variables left exposed open the door. An attacker can push a malicious change to a branch that auto-runs in the pipeline. With elevated privileges, they extract secrets, start lateral movement, and overwrite artifacts.
Another vector is dependency injection. When pipelines pull in scripts or containers from external sources without verification, a single compromised dependency can escalate privileges silently. This is why auditing all pipeline steps is critical. Immutable builds, least privilege policies, and strong secret management are the baseline defenses.