CVE-2026-29773
Plain English Summary
AI-powered analysis for quick understanding
An attacker with special permissions can exploit a flaw in Kubewarden to read sensitive information about Ingresses, Namespaces, and Services in a Kubernetes cluster. This requires the attacker to have been granted specific "AdmissionPolicy" create permissions, which are not typically given by default.
Technical Description
Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation. An attacker with privileged "AdmissionPolicy" create permissions (which isn't the default) could make use of 3 deprecated host-callback APIs: kubernetes/ingresses, kubernetes/namespaces, kubernetes/services. The attacker can craft a policy that exercises these deprecated API calls and would allow them read access to Ingresses, Namespaces, and Services resources respectively. This attack is read-only, there is no write capability and no access to Secrets, ConfigMaps, or other resource types beyond these three.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 10, 2026
28 days ago
Last Modified
Mar 11, 2026
27 days ago