top of page

Cluster Admin for All: Critical Kyverno Flaw (CVSS 10) Shatters Isolation

  • Jan 30
  • 2 min read

Key Findings


  • Kyverno, a popular Kubernetes-native policy engine, has released an urgent security update to address a critical vulnerability (CVE-2026-22039) with a maximum CVSS score of 10.

  • The flaw allows any user with policy creation rights to effectively become a cluster admin, shattering Kyverno's isolation boundaries.

  • The update also fixes a high-severity Denial of Service (DoS) vulnerability (CVE-2026-23881) with a CVSS score of 7.7.


Background


Kyverno is a Kubernetes-native policy engine that enables cluster administrators to manage and enforce policies across their entire Kubernetes environment. It is designed to provide a flexible and scalable way to apply security and compliance policies to Kubernetes resources.


Critical Privilege Escalation Vulnerability (CVE-2026-22039)


  • The critical vulnerability, CVE-2026-22039, stems from a failure in how Kyverno handles API calls within namespaced policies.

  • Normally, a policy created in a specific namespace (e.g., "dev-team-a") should stay within that sandbox. However, researchers discovered that the `apiCall` feature lacked this enforcement.

  • The resolved `urlPath` is executed using the Kyverno admission controller ServiceAccount, which typically holds broad, cluster-wide permissions.

  • An attacker can exploit this by crafting a policy that substitutes variables into the `urlPath` field, tricking Kyverno into making requests on their behalf.

  • Any authenticated user with permission to create a namespaced Policy can cause Kyverno to perform Kubernetes API requests targeting any API path allowed by that Service Account's RBAC.

  • This allows for severe consequences, including privilege escalation, data exfiltration, and cluster disruption.


Denial of Service Vulnerability (CVE-2026-23881)


  • Alongside the privilege escalation, the team also patched CVE-2026-23881, a Denial of Service vulnerability with a CVSS score of 7.7.

  • This flaw allows users to crash the Kyverno engine by creating policies that trigger exponential memory consumption.

  • Unbounded memory consumption in Kyverno's policy engine allows users to cause denial of service by crafting policies that exponentially amplify string data through context variables.

  • If the cluster is configured with `failurePolicy: Ignore`, workloads could bypass all validation during the outage, leaving the door open for further attacks or misconfigurations.


Mitigation and Recommendations


  • Both vulnerabilities affect Kyverno versions 1.16.2 and earlier, as well as 1.15.2 and earlier.

  • The maintainers have released patched versions v1.16.3 and v1.15.3 that introduce strict validation logic to address the critical flaw.

  • For the privilege escalation vulnerability, the new logic ensures that namespaced policies can only target resources within their own namespace, rejecting any requests that attempt to cross boundaries.

  • Users are strongly recommended to update to the patched versions to mitigate these critical security risks.


Sources


  • https://securityonline.info/cluster-admin-for-all-critical-kyverno-flaw-cvss-10-shatters-isolation/

  • https://x.com/the_yellow_fall/status/2017054836072620347

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page