Impact
Kyverno and its associated policies are exposed to a Server Side Request Forgery (SSRF) flaw caused by unrestricted CEL HTTP functions. The vulnerability allows an attacker to instruct Kyverno to issue HTTP requests to arbitrary hosts from within the cluster, potentially accessing internal resources or sensitive information. The weakness is categorized as CWE‑918.
Affected Systems
All Kyverno deployments running version 1.16.0 or newer are affected. The issue exists in any installation that includes the relevant CEL HTTP function code and does not have a patch that mitigates the flaw.
Risk and Exploitability
The severity rating of 9.8 places the flaw in the critical range. The EPSS score indicates that exploitation attempts are currently rare, and the vulnerability is not present in the CISA KEV catalog. Based on the description, the likely attack vector is when an attacker can submit or modify policy rules that invoke the CEL HTTP function, though the specific prerequisites are not disclosed in the CVE data.
OpenCVE Enrichment
Github GHSA