Home

Description

Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation. An attacker with privileged "AdmissionPolicy" create permissions (which isn't the default) could make use of 3 deprecated host-callback APIs: kubernetes/ingresses, kubernetes/namespaces, kubernetes/services. The attacker can craft a policy that exercises these deprecated API calls and would allow them read access to Ingresses, Namespaces, and Services resources respectively. This attack is read-only, there is no write capability and no access to Secrets, ConfigMaps, or other resource types beyond these three.

PUBLISHED Reserved 2026-03-04 | Published 2026-03-09 | Updated 2026-03-09 | Assigner GitHub_M




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-863: Incorrect Authorization

Product status

< 1.33.0
affected

References

github.com/...roller/security/advisories/GHSA-6r7f-3fwq-hq74

github.com/kubewarden/kubewarden-controller/pull/1519

github.com/...ommit/4e41b60ae44902d82d94101bac93fb77cae65651

cve.org (CVE-2026-29773)

nvd.nist.gov (CVE-2026-29773)

Download JSON