Authentication Bypass Using an Alternate Path or Channel Affecting github.com/kyverno/kyverno/pkg/utils/engine package, versions <1.13.5>=1.14.0-alpha.1 <1.14.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMKYVERNOKYVERNOPKGUTILSENGINE-10118250
  • published13 May 2025
  • disclosed5 May 2025
  • creditAndreas Brehmer

Introduced: 5 May 2025

NewCVE-2025-46342  (opens in a new tab)
CWE-288  (opens in a new tab)

How to fix?

Upgrade github.com/kyverno/kyverno/pkg/utils/engine to version 1.13.5, 1.14.0 or higher.

Overview

Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel due to improper handling of namespace selectors in the GetNamespaceSelectorsFromNamespaceLister() function in labels.go. An attacker can bypass policy rules using malicious requests that omit or manipulate namespace information. If the Kube API Server can be compromised to partially deny service by other means, which notably have not been realistically demonstrated, the SharedIndexInformer cache can fall behind. This forces an error, which rather than being propagated to the endpoint, is returned as an empty label map.

CVSS Base Scores

version 4.0
version 3.1