Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-41323
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-24 Apr, 2026 | 04:16
Updated At-27 Apr, 2026 | 17:53

Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissions to patch webhook configurations, a stolen token leads to full cluster compromise. Versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4 patch the issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Primary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Type: Primary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CPE Matches

kyverno
kyverno
>>kyverno>>Versions before 1.16.4(exclusive)
cpe:2.3:a:kyverno:kyverno:*:-:*:*:*:*:*:*
kyverno
kyverno
>>kyverno>>Versions from 1.17.0(inclusive) to 1.17.2(exclusive)
cpe:2.3:a:kyverno:kyverno:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Secondarysecurity-advisories@github.com
CWE-918Secondarysecurity-advisories@github.com
CWE ID: CWE-200
Type: Secondary
Source: security-advisories@github.com
CWE ID: CWE-918
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/kyverno/kyverno/commit/bc4f91c4801b1eaa2edc0a14e2f1b0af8cf0c1f5security-advisories@github.com
Patch
https://github.com/kyverno/kyverno/commit/c2eab00033e635bda4e4efb58c1b472b41728bb6security-advisories@github.com
Patch
https://github.com/kyverno/kyverno/commit/f70e8ac1e7acd2e3844f9553e4a884f07f953de0security-advisories@github.com
Patch
https://github.com/kyverno/kyverno/security/advisories/GHSA-f9g8-6ppc-pqq4security-advisories@github.com
Vendor Advisory
Exploit
https://github.com/kyverno/kyverno/security/advisories/GHSA-f9g8-6ppc-pqq4134c704f-9b21-4f2e-91b3-4a467353bcc0
Vendor Advisory
Exploit
Hyperlink: https://github.com/kyverno/kyverno/commit/bc4f91c4801b1eaa2edc0a14e2f1b0af8cf0c1f5
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/kyverno/kyverno/commit/c2eab00033e635bda4e4efb58c1b472b41728bb6
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/kyverno/kyverno/commit/f70e8ac1e7acd2e3844f9553e4a884f07f953de0
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/kyverno/kyverno/security/advisories/GHSA-f9g8-6ppc-pqq4
Source: security-advisories@github.com
Resource:
Vendor Advisory
Exploit
Hyperlink: https://github.com/kyverno/kyverno/security/advisories/GHSA-f9g8-6ppc-pqq4
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Vendor Advisory
Exploit
Change History
0Changes found

Details not found