First published: Tue Apr 29 2025(Updated: )
### Summary Due to a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go` it may happen that policy rules using namespace selector(s) in their `match` statements are mistakenly not applied during admission review request processing. As a consequence, security-critical mutations and validations are bypassed, potentially allowing attackers with K8s API access to perform malicious operations. ### Details As a policy engine Kyverno is a critical component ensuring the security of Kubernetes clusters by apply security-relevant policy rules in the Kubernetes admission control process. We encountered a case where Kyverno did not apply policy rules which should have been applied. This happened in both the mutation and the validation phase of admission control. Effectively Kyverno handled the admission review requests as if those policy rules did not exist. Consequently, the Kube API request was accepted without applying security-relevant patches and validations. As the root cause we identified a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go` ([src][1]). All affected policy rules use a namespace selector in their match resource filters like this: ```yaml match: all: - resources: namespaceSelector: matchExpressions: - key: label1 operator: Exists ``` Such specification intents to apply rules only to resource objects which reside in a namespace whose labels match the given label expressions. When Kyverno handles an admission webhook, function `GetNamespaceSelectorsFromNamespaceLister` in package `github.com/kyverno/kyverno/pkg/utils/engine` ([src][1]) is called to retrieve the labels of the request object's namespace. This function gets the namespace object from a `"k8s.io/client-go/listers/core/v1".NamespaceLister`. In case the namespace lister returns an error, `GetNamespaceSelectorsFromNamespaceLister` does NOT propagate this error to its caller, but returns an empty label map, which is equivalent to a namespace without any labels. The returned label map is later used to select matching policy rules. If a rule has a resource filter with namespace selector, it will be mistakenly excluded or included. The namespace lister fails to return the namespace object if the underlying `SharedIndexInformer` has not (yet) updated its cache. Those updates happen based on watch events from the Kube API Server, which does not guarantee any maximum delivery time. If the Kube API Server handling the watch is under high load or otherwise impaired (e.g. requests to etcd take longer due to pending leader election in HA setup) then informer cache updates can be delayed significantly. However, we did not find a way to reliably reproduce such condition. To bypass Kyverno policies, an attacker may try to exploit the described misbehavior by: - putting the Kube API Server under load before sending requests that Kyverno policies should be bypassed for. - sending many request with a high rate to Kube API Server. We did not try any of such attack vectors and therefore cannot prove their effectiveness. In our scenario the Kyverno policies apply to pods in "sandbox" namespaces identified as such by certain labels. Those single-use namespaces and the pods therein are frequently created (and removed) by other controllers. Therefore, Kyverno often receives admission webhooks for objects whose namespace has been created shortly before. #### Correction Proposal Function `GetNamespaceSelectorsFromNamespaceLister` in package `github.com/kyverno/kyverno/pkg/utils/engine` ([src][1]) should return an error instead of an empty label map in case it could not get the namespace object from the namespace lister. This error will then cause admission webhook processing to fail, which lets Kubernetes fail the Kube API request if the policy's failure policy is `Fail` (a must for security-relevant policies). In addition, function `GetNamespaceSelectorsFromNamespaceLister` could retry (with deadline) to get the namespace object from the namespace lister in case of a NotFound error. But as admission webhook processing time should be kept as short as possible, this might not be a good idea. Another option would be to perform a GET request for the namespace as a fallback in case the namespace lister returns a NotFound error. ### PoC We did not find a way to reliably reproduce such case. ### Impact Administrators attempting to enforce cluster security through Kyverno policies, but that allow less privileged users or service accounts to create/update/delete resources. [1]: https://github.com/kyverno/kyverno/blob/a96b1a4794b4d25cb0c6d72c05fc6355e95cf65c/pkg/utils/engine/labels.go#L10
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/kyverno/kyverno | >=1.14.0-alpha.1<1.14.0 | 1.14.0 |
go/github.com/kyverno/kyverno | <1.13.5 | 1.13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46342 is classified as a medium severity vulnerability due to its potential to affect policy rule enforcement.
To fix CVE-2025-46342, upgrade to version 1.14.0 or patch to version 1.13.5 of the kyverno package.
CVE-2025-46342 affects the kyverno package specifically versions prior to 1.14.0 and any version lower than 1.13.5.
Exploitation of CVE-2025-46342 may lead to admission review requests failing to apply certain policy rules due to missing error propagation.
CVE-2025-46342 was discovered through code analysis of the function GetNamespaceSelectorsFromNamespaceLister in the kyverno repository.