Uncaught Exception Affecting github.com/kyverno/kyverno/pkg/engine/wildcards package, versions <1.14.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Uncaught Exception vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMKYVERNOKYVERNOPKGENGINEWILDCARDS-10878177
  • published23 Jul 2025
  • disclosed22 Jul 2025
  • creditVille Vesilehto

Introduced: 22 Jul 2025

CVE-2025-47281  (opens in a new tab)
CWE-248  (opens in a new tab)

How to fix?

Upgrade github.com/kyverno/kyverno/pkg/engine/wildcards to version 1.14.2 or higher.

Overview

Affected versions of this package are vulnerable to Uncaught Exception via improper handling of JMESPath variable substitutions in the getValueAsStringMap function within pkg/engine/wildcards/wildcards.go. An attacker can cause the admission controller and reports controller to crash by crafting a policy that uses a variable substitution with an invalid JMESPath function (e.g., {{@ | non_existent_function}}), resulting in a nil value where a string is expected. This triggers a panic and leads to service unavailability.

Note:

This is only exploitable if the attacker has permissions to create or update Policy or ClusterPolicy resources.

References

CVSS Base Scores

version 4.0
version 3.1