Description
Kyverno, versions 1.16.0 and later, are vulnerable to SSRF due to unrestricted CEL HTTP functions.
Published: 2026-03-30
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Server-side request forgery (SSRF) leading to potential internal network exposure
Action: Patch
AI Analysis

Impact

Kyverno versions 1.16.0 and later expose an SSRF flaw through unrestricted Common Expression Language (CEL) HTTP functions. An attacker who can influence or inject a CEL expression may cause the Kyverno controller to issue arbitrary HTTP requests to any IP address reachable from the cluster. This can lead to data exfiltration, discovery of internal services, or further lateral movement. The core weakness is an unchecked HTTP call capability embedded in policy evaluation, enabling malicious payloads to force requests to privileged internal endpoints.

Affected Systems

The vulnerability affects Kyverno, the Kubernetes policy engine. All releases from 1.16.0 onward are impacted until a fix that limits or disables the CEL HTTP function is applied. No specific sub‑versions are excluded; any installation running an affected version is at risk.

Risk and Exploitability

Official risk scoring is not available, but the nature of SSRF implies that confidentiality and availability risks could be significant, especially in environments with open internal services. The lack of an EPSS value does not preclude exploitation; attackers can craft a policy that triggers the vulnerable function. Because the vulnerability relies on an input that an attacker can control (policy or admission review), the attack requires knowledge of Kyverno deployment, but once present it can be exploited with minimal effort. The vulnerability is not listed in the KEV catalog at this time.

Generated by OpenCVE AI on March 31, 2026 at 06:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kyverno to the latest release that restricts CEL HTTP functions
  • If an upgrade cannot be performed immediately, disable or remove CEL HTTP functions from policies or enforce policies that block them
  • Verify that the cluster’s network policies and firewall rules limit outbound traffic from the Kyverno pod to only necessary destinations

Generated by OpenCVE AI on March 31, 2026 at 06:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Kyverno
Kyverno kyverno
Weaknesses CWE-918
Vendors & Products Kyverno
Kyverno kyverno

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description Kyverno, versions 1.16.0 and later, are vulnerable to SSRF due to unrestricted CEL HTTP functions.
Title CVE-2026-4789
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-03-30T21:18:08.577Z

Reserved: 2026-03-24T20:03:13.388Z

Link: CVE-2026-4789

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-30T21:17:10.843

Modified: 2026-03-30T22:16:20.483

Link: CVE-2026-4789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:40:02Z

Weaknesses