Description
A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, potentially disclosing sensitive information or performing actions they are not permitted to do. Additionally, legitimate users may be denied access to resources.
Published: 2026-04-15
Score: 5.4 Medium
EPSS: n/a
KEV: No
Impact: Unauthorized subresource access due to improper RBAC evaluation
Action: Assess Impact
AI Analysis

Impact

The vulnerability in KubeVirt lies in its RBAC evaluation logic, where subresource names are improperly truncated. This flaw causes the authorization mechanism to incorrectly grant or deny permissions, allowing authenticated users with custom roles to act on subresources they should not control. Consequently, attackers could disclose sensitive data or perform unauthorized operations, and honest users may experience denied access to legitimate resources. The weakness corresponds to CWE‑863, indicating a depletion of permissions-checking controls.

Affected Systems

This issue affects Red Hat OpenShift Virtualization 4, specifically the Container Native Virtualization product version 4. No further version specifics are currently listed, so all installations within this product line are potentially impacted.

Risk and Exploitability

The CVSS score of 5.4 places the vulnerability in the medium severity range. EPSS data is not available, and the CISA KEV catalog does not list it, indicating no confirmed widespread exploitation yet. The likely exploitation scenario requires an authenticated user with a custom role that includes subresource permissions; the attacker can then make requests to subresources that are incorrectly evaluated. As there is no publicly available exploit code noted, the primary risk remains the potential for unauthorized access and denial of service caused by mis‑evaluated roles.

Generated by OpenCVE AI on April 16, 2026 at 02:29 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.


OpenCVE Recommended Actions

  • Apply Red Hat releases that include the fix as soon as they become available
  • Audit and prune custom RBAC roles, ensuring they only grant necessary subresource permissions
  • Configure or monitor audit logs for anomalous subresource access to detect potential abuse

Generated by OpenCVE AI on April 16, 2026 at 02:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 15 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, potentially disclosing sensitive information or performing actions they are not permitted to do. Additionally, legitimate users may be denied access to resources.
Title Kubevirt: kubevirt: unauthorized subresource access due to improper rbac evaluation
First Time appeared Redhat
Redhat container Native Virtualization
Weaknesses CWE-863
CPEs cpe:/a:redhat:container_native_virtualization:4
Vendors & Products Redhat
Redhat container Native Virtualization
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Redhat Container Native Virtualization
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-15T18:40:31.052Z

Reserved: 2026-04-15T18:03:12.839Z

Link: CVE-2026-6383

cve-icon Vulnrichment

Updated: 2026-04-15T18:40:25.744Z

cve-icon NVD

Status : Received

Published: 2026-04-15T19:16:38.520

Modified: 2026-04-15T19:16:38.520

Link: CVE-2026-6383

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-15T18:03:18Z

Links: CVE-2026-6383 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:30:21Z

Weaknesses