CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-GG4X-FGG2-H9W9
9.00.08%

The VIP List Loophole: Bypassing Kyverno Policies via Exception Stacking

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 6, 2026·7 min read·3 visits

PoC Available

Executive Summary (TL;DR)

Kyverno v1.9.0 through v1.12.7 has a critical logic flaw in handling multiple `PolicyException` objects. If an administrator defines a specific exception (e.g., "allow in namespace A") and a broad exception (e.g., "allow pods named *ingress*"), Kyverno treats these as a simple OR condition. An attacker can deploy a malicious payload in a restricted namespace simply by matching the name pattern of the broad exception, bypassing policies like `disallow-host-path` and gaining potential root access to nodes.

A logic flaw in Kyverno's policy engine allows attackers to bypass critical security enforcement by exploiting how the system aggregates multiple PolicyException resources. By crafting resources that match broad exception patterns (like names), attackers can evade namespace-specific restrictions.

Official Patches

KyvernoRelease notes for v1.13.0 containing the fix

Technical Appendix

CVSS Score
9.0/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Probability
0.08%
Top 100% most exploited

Affected Systems

Kyverno Policy EngineKubernetes Clusters using Kyverno

Affected Versions Detail

Product
Affected Versions
Fixed Version
Kyverno
Kyverno
>= 1.9.0, <= 1.12.71.13.0
AttributeDetail
SeverityCritical (9.0)
Attack VectorNetwork (Kubernetes API)
Bug ClassLogic Error / Improper Policy Composition
Affected Versionsv1.9.0 - v1.12.7
Privileges RequiredLow (Create Pods)
StatusPatched

MITRE ATT&CK Mapping

T1562Impair Defenses
Defense Evasion
T1068Exploitation for Privilege Escalation
Privilege Escalation
T1611Escape to Host
Privilege Escalation
CWE-284
Improper Access Control

The product does not correctly calculate or handle the union of multiple permission/exception sets, leading to unintended access.

Known Exploits & Detection

GitHub AdvisoryAdvisory containing PoC steps and YAML examples

Vulnerability Timeline

Vulnerability discovered by researcher mtkpi
2025-12-01
GHSA-GG4X-FGG2-H9W9 Published
2026-01-06
Kyverno v1.13.0 Released (Patch)
2026-01-06

References & Sources

  • [1]GHSA-GG4X-FGG2-H9W9 Advisory
  • [2]Kyverno Documentation: Policy Exceptions

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.