8.6
CWE
1287
Advisory Published
CVE Published
Updated

CVE-2025-46342: Kyverno vulnerable to bypass of policy rules that use namespace selectors in match statements

First published: Tue Apr 29 2025(Updated: )

### Summary Due to a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go` it may happen that policy rules using namespace selector(s) in their `match` statements are mistakenly not applied during admission review request processing. As a consequence, security-critical mutations and validations are bypassed, potentially allowing attackers with K8s API access to perform malicious operations. ### Details As a policy engine Kyverno is a critical component ensuring the security of Kubernetes clusters by apply security-relevant policy rules in the Kubernetes admission control process. We encountered a case where Kyverno did not apply policy rules which should have been applied. This happened in both the mutation and the validation phase of admission control. Effectively Kyverno handled the admission review requests as if those policy rules did not exist. Consequently, the Kube API request was accepted without applying security-relevant patches and validations. As the root cause we identified a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go` ([src][1]). All affected policy rules use a namespace selector in their match resource filters like this: ```yaml match: all: - resources: namespaceSelector: matchExpressions: - key: label1 operator: Exists ``` Such specification intents to apply rules only to resource objects which reside in a namespace whose labels match the given label expressions. When Kyverno handles an admission webhook, function `GetNamespaceSelectorsFromNamespaceLister` in package `github.com/kyverno/kyverno/pkg/utils/engine` ([src][1]) is called to retrieve the labels of the request object's namespace. This function gets the namespace object from a `"k8s.io/client-go/listers/core/v1".NamespaceLister`. In case the namespace lister returns an error, `GetNamespaceSelectorsFromNamespaceLister` does NOT propagate this error to its caller, but returns an empty label map, which is equivalent to a namespace without any labels. The returned label map is later used to select matching policy rules. If a rule has a resource filter with namespace selector, it will be mistakenly excluded or included. The namespace lister fails to return the namespace object if the underlying `SharedIndexInformer` has not (yet) updated its cache. Those updates happen based on watch events from the Kube API Server, which does not guarantee any maximum delivery time. If the Kube API Server handling the watch is under high load or otherwise impaired (e.g. requests to etcd take longer due to pending leader election in HA setup) then informer cache updates can be delayed significantly. However, we did not find a way to reliably reproduce such condition. To bypass Kyverno policies, an attacker may try to exploit the described misbehavior by: - putting the Kube API Server under load before sending requests that Kyverno policies should be bypassed for. - sending many request with a high rate to Kube API Server. We did not try any of such attack vectors and therefore cannot prove their effectiveness. In our scenario the Kyverno policies apply to pods in "sandbox" namespaces identified as such by certain labels. Those single-use namespaces and the pods therein are frequently created (and removed) by other controllers. Therefore, Kyverno often receives admission webhooks for objects whose namespace has been created shortly before. #### Correction Proposal Function `GetNamespaceSelectorsFromNamespaceLister` in package `github.com/kyverno/kyverno/pkg/utils/engine` ([src][1]) should return an error instead of an empty label map in case it could not get the namespace object from the namespace lister. This error will then cause admission webhook processing to fail, which lets Kubernetes fail the Kube API request if the policy's failure policy is `Fail` (a must for security-relevant policies). In addition, function `GetNamespaceSelectorsFromNamespaceLister` could retry (with deadline) to get the namespace object from the namespace lister in case of a NotFound error. But as admission webhook processing time should be kept as short as possible, this might not be a good idea. Another option would be to perform a GET request for the namespace as a fallback in case the namespace lister returns a NotFound error. ### PoC We did not find a way to reliably reproduce such case. ### Impact Administrators attempting to enforce cluster security through Kyverno policies, but that allow less privileged users or service accounts to create/update/delete resources. [1]: https://github.com/kyverno/kyverno/blob/a96b1a4794b4d25cb0c6d72c05fc6355e95cf65c/pkg/utils/engine/labels.go#L10

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
go/github.com/kyverno/kyverno>=1.14.0-alpha.1<1.14.0
1.14.0
go/github.com/kyverno/kyverno<1.13.5
1.13.5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-46342?

    CVE-2025-46342 is classified as a medium severity vulnerability due to its potential to affect policy rule enforcement.

  • How do I fix CVE-2025-46342?

    To fix CVE-2025-46342, upgrade to version 1.14.0 or patch to version 1.13.5 of the kyverno package.

  • What systems are affected by CVE-2025-46342?

    CVE-2025-46342 affects the kyverno package specifically versions prior to 1.14.0 and any version lower than 1.13.5.

  • What happens if CVE-2025-46342 is exploited?

    Exploitation of CVE-2025-46342 may lead to admission review requests failing to apply certain policy rules due to missing error propagation.

  • How was CVE-2025-46342 discovered?

    CVE-2025-46342 was discovered through code analysis of the function GetNamespaceSelectorsFromNamespaceLister in the kyverno repository.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203