NIXPKGS-2026-1277
GitHub issue
published on
Permalink
CVE-2026-41323
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse ignored reference https://g…
- @LeSuisse ignored package kyverno-chainsaw
- @LeSuisse ignored
- @LeSuisse accepted
- @LeSuisse published on GitHub
Kyverno: ServiceAccount token leaked to external servers via apiCall service URL
Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissions to patch webhook configurations, a stolen token leads to full cluster compromise. Versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4 patch the issue.
References
-
https://github.com/kyverno/kyverno/security/advisories/GHSA-f9g8-6ppc-pqq4 x_refsource_CONFIRM
Ignored references (3)
Affected products
kyverno
- ==>= 1.17.0-rc1, < 1.17.2-rc1
- ==< 1.16.4
Matching in nixpkgs
Package maintainers
-
@Scrumplex Sefa Eyeoglu <contact@scrumplex.net>
-
@LorenzBischof Lorenz Bischof <nix@lorenzbischof.ch>