Incorrect Authorization Affecting k8s.io/kubernetes/pkg/apis/core/validation package, versions >=1.32.0 <1.32.6>=1.33.0 <1.33.2>=1.34.0-alpha.0 <1.34.0-alpha.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-K8SIOKUBERNETESPKGAPISCOREVALIDATION-10495506
  • published24 Jun 2025
  • disclosed23 Jun 2025
  • creditAmit Schendel

Introduced: 23 Jun 2025

NewCVE-2025-4563  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade k8s.io/kubernetes/pkg/apis/core/validation to version 1.32.6, 1.33.2, 1.34.0-alpha.1 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Authorization via the NodeRestriction admission controller process. An attacker can access unauthorized dynamic resources by creating mirror pods during pod creation when the DynamicResourceAllocation feature gate is enabled.

Note:

The DynamicResourceAllocation feature is disabled by default but it is recommended to check if it is enabled and to turn it off if not actively used.

To check if the feature is in use run the following commands:

  • kubectl get ResourceClaim --all-namespaces
  • kubectl get pods --all-namespaces -o json | jq -r '.items[] | select(.metadata.annotations["kubernetes.io/config.mirror"] == "true") | "\(.metadata.namespace)/(.metadata.name)"'

CVSS Base Scores

version 4.0
version 3.1