top of page

Cluster Admin for All: Critical Kyverno Flaw (CVSS 10) Shatters Isolation

  • Jan 30
  • 2 min read

Key Findings


  • Kyverno, a popular Kubernetes-native policy engine, has released an urgent security update to address a critical vulnerability (CVE-2026-22039) with a maximum CVSS score of 10.

  • The flaw allows any user with policy creation rights to effectively become a cluster admin, shattering Kyverno's isolation boundaries.

  • The update also fixes a high-severity Denial of Service (DoS) vulnerability (CVE-2026-23881) with a CVSS score of 7.7.


Background


Kyverno is a Kubernetes-native policy engine that enables cluster administrators to manage and enforce policies across their entire Kubernetes environment. It is designed to provide a flexible and scalable way to apply security and compliance policies to Kubernetes resources.


Critical Privilege Escalation Vulnerability (CVE-2026-22039)


  • The critical vulnerability, CVE-2026-22039, stems from a failure in how Kyverno handles API calls within namespaced policies.

  • Normally, a policy created in a specific namespace (e.g., "dev-team-a") should stay within that sandbox. However, researchers discovered that the `apiCall` feature lacked this enforcement.

  • The resolved `urlPath` is executed using the Kyverno admission controller ServiceAccount, which typically holds broad, cluster-wide permissions.

  • An attacker can exploit this by crafting a policy that substitutes variables into the `urlPath` field, tricking Kyverno into making requests on their behalf.

  • Any authenticated user with permission to create a namespaced Policy can cause Kyverno to perform Kubernetes API requests targeting any API path allowed by that Service Account's RBAC.

  • This allows for severe consequences, including privilege escalation, data exfiltration, and cluster disruption.


Denial of Service Vulnerability (CVE-2026-23881)


  • Alongside the privilege escalation, the team also patched CVE-2026-23881, a Denial of Service vulnerability with a CVSS score of 7.7.

  • This flaw allows users to crash the Kyverno engine by creating policies that trigger exponential memory consumption.

  • Unbounded memory consumption in Kyverno's policy engine allows users to cause denial of service by crafting policies that exponentially amplify string data through context variables.

  • If the cluster is configured with `failurePolicy: Ignore`, workloads could bypass all validation during the outage, leaving the door open for further attacks or misconfigurations.


Mitigation and Recommendations


  • Both vulnerabilities affect Kyverno versions 1.16.2 and earlier, as well as 1.15.2 and earlier.

  • The maintainers have released patched versions v1.16.3 and v1.15.3 that introduce strict validation logic to address the critical flaw.

  • For the privilege escalation vulnerability, the new logic ensures that namespaced policies can only target resources within their own namespace, rejecting any requests that attempt to cross boundaries.

  • Users are strongly recommended to update to the patched versions to mitigate these critical security risks.


Sources


  • https://securityonline.info/cluster-admin-for-all-critical-kyverno-flaw-cvss-10-shatters-isolation/

  • https://x.com/the_yellow_fall/status/2017054836072620347

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page