Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissions to patch webhook configurations, a stolen token leads to full cluster compromise. Versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4 patch the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 27 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kyverno
Kyverno kyverno |
|
| CPEs | cpe:2.3:a:kyverno:kyverno:*:*:*:*:*:*:*:* cpe:2.3:a:kyverno:kyverno:*:-:*:*:*:*:*:* |
|
| Vendors & Products |
Kyverno
Kyverno kyverno |
Fri, 24 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissions to patch webhook configurations, a stolen token leads to full cluster compromise. Versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4 patch the issue. | |
| Title | Kyverno: ServiceAccount token leaked to external servers via apiCall service URL | |
| Weaknesses | CWE-200 CWE-918 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-24T03:21:36.265Z
Updated: 2026-04-24T12:05:00.276Z
Reserved: 2026-04-20T14:01:46.672Z
Link: CVE-2026-41323
Updated: 2026-04-24T12:04:41.403Z
Status : Analyzed
Published: 2026-04-24T04:16:20.593
Modified: 2026-04-27T17:53:22.783
Link: CVE-2026-41323
No data.
ReportizFlow