Impact
The vulnerability stems from a mis‑written NetworkPolicy in Fullchain versions before 0.1.1. That policy incorrectly permits traffic between Pods in different namespaces, effectively granting an attacker who compromises one Pod the ability to access any Pod elsewhere in the cluster. This flaw is an authorization failure (CWE‑284) that facilitates lateral movement and undermines the intended namespace isolation, potentially exposing sensitive data or allowing further compromise of cluster resources.
Affected Systems
The affected product is Fullchain, produced by ctfer. All releases older than 0.1.1 are vulnerable. The fix is delivered in Fullchain 0.1.1 and later.
Risk and Exploitability
The CVSS score of 7.1 indicates a medium‑to‑high severity. The EPSS score of less than 1 % suggests a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an initial foothold within a namespace‑restricted application Pod; once inside, the attacker can pivot across namespaces because the faulty policy permits inter‑namespace communication.
OpenCVE Enrichment
Github GHSA