Description
Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the Kyverno admission controller ServiceAccount, with no enforcement that the request is limited to the policy’s namespace. As a result, any authenticated user with permission to create a namespaced Policy can cause Kyverno to perform Kubernetes API requests using Kyverno’s admission controller identity, targeting any API path allowed by that ServiceAccount’s RBAC. This breaks namespace isolation by enabling cross-namespace reads (for example, ConfigMaps and, where permitted, Secrets) and allows cluster-scoped or cross-namespace writes (for example, creating ClusterPolicies) by controlling the urlPath through context variable substitution. Versions 1.16.3 and 1.15.3 contain a patch for the vulnerability.
Published: 2026-01-27
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Authorization Bypass
Action: Immediate Patch
AI Analysis

Impact

A flaw in Kyverno’s admission controller causes the resolved API request path to be executed with the controller’s ServiceAccount without verifying the policy’s namespace. Consequently, an attacker with rights to create a namespaced Policy can cause Kyverno to perform arbitrary Kubernetes API calls on behalf of the ServiceAccount, allowing them to read or modify resources across namespaces or create cluster‑level policies. The vulnerability falls under CWE‑269 and CWE‑918. Its impact can extend to compromising secrets, configuration, and the overall integrity of the cluster.

Affected Systems

All Kyverno installations running a version older than 1.16.3 or 1.15.3 are affected. The fix is included in those patch releases, so any deployment that has not been updated to 1.16.3 or later, or 1.15.3 or later, remains vulnerable.

Risk and Exploitability

The CVSS score of 10 reflects the full authority an attacker gains once the policy is created. The EPSS score indicates that, at the time of assessment, widespread exploitation is unlikely but possible. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be a legitimate user action: any authenticated user authorized to create a policy can exploit the flaw by injecting a crafted urlPath. No additional privileges are required beyond policy creation rights.

Generated by OpenCVE AI on April 18, 2026 at 02:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Kyverno upgrade to version 1.16.3 or 1.15.3 to include the vendor patch.
  • Ensure that only trusted users have the ability to create namespaced Policies by tightening RBAC permissions.
  • Verify that the ServiceAccount used by Kyverno’s admission controller is scoped to only the namespaces that the cluster requires, limiting the impact of any future authorization bypasses.

Generated by OpenCVE AI on April 18, 2026 at 02:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8p9x-46gm-qfx2 Kyverno Cross-Namespace Privilege Escalation via Policy apiCall
History

Mon, 02 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:kyverno:kyverno:*:*:*:*:*:*:*:*

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Kyverno
Kyverno kyverno
Vendors & Products Kyverno
Kyverno kyverno

Tue, 27 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Description Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the Kyverno admission controller ServiceAccount, with no enforcement that the request is limited to the policy’s namespace. As a result, any authenticated user with permission to create a namespaced Policy can cause Kyverno to perform Kubernetes API requests using Kyverno’s admission controller identity, targeting any API path allowed by that ServiceAccount’s RBAC. This breaks namespace isolation by enabling cross-namespace reads (for example, ConfigMaps and, where permitted, Secrets) and allows cluster-scoped or cross-namespace writes (for example, creating ClusterPolicies) by controlling the urlPath through context variable substitution. Versions 1.16.3 and 1.15.3 contain a patch for the vulnerability.
Title Kyverno Cross-Namespace Privilege Escalation via Policy apiCall
Weaknesses CWE-269
CWE-918
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T16:42:49.789Z

Reserved: 2026-01-05T22:30:38.719Z

Link: CVE-2026-22039

cve-icon Vulnrichment

Updated: 2026-01-27T16:41:52.472Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T17:16:12.097

Modified: 2026-02-02T15:13:57.440

Link: CVE-2026-22039

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:15:05Z

Weaknesses