Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14459: Authorization Bypass Through User-Controlled Key in Red Hat RHEL-9-CNV-4.19

0
High
VulnerabilityCVE-2025-14459cvecve-2025-14459
Published: Mon Jan 26 2026 (01/26/2026, 19:36:29 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: RHEL-9-CNV-4.19

Description

A flaw was found in KubeVirt Containerized Data Importer (CDI). This vulnerability allows a user to clone PersistentVolumeClaims (PVCs) from unauthorized namespaces, resulting in unauthorized access to data via the DataImportCron PVC source mechanism.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:19:03 UTC

Technical Analysis

CVE-2025-14459 is a vulnerability discovered in the KubeVirt Containerized Data Importer (CDI) component used within Red Hat Enterprise Linux 9 with the Container Native Virtualization (CNV) 4.19 stack. The flaw arises from an authorization bypass that occurs due to improper validation of user-controlled keys when cloning PersistentVolumeClaims (PVCs). Specifically, an attacker with low-level privileges can exploit the DataImportCron PVC source mechanism to clone PVCs from namespaces to which they should not have access. This bypass allows unauthorized access to potentially sensitive data stored in PVCs across different Kubernetes namespaces, violating namespace isolation principles. The vulnerability has a CVSS 3.1 base score of 8.5, indicating high severity, with the vector AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N. This means the attack can be performed remotely over the network with low attack complexity, requires privileges but no user interaction, and causes a significant confidentiality impact, partial integrity impact, and no availability impact. The scope is changed, indicating the vulnerability affects resources beyond the initially authorized boundary. No patches or exploits are currently publicly documented, but the risk remains high due to the sensitive nature of cross-namespace data access in multi-tenant Kubernetes environments.

Potential Impact

The primary impact of CVE-2025-14459 is unauthorized data disclosure due to the ability to clone PVCs from namespaces without proper authorization. This compromises confidentiality of data stored in Kubernetes persistent volumes, which may include sensitive application data, credentials, or other critical information. The integrity impact is limited but present, as unauthorized cloning could lead to data leakage or misuse. Availability is not affected. For organizations running containerized workloads on Red Hat RHEL-9 CNV environments, especially those using KubeVirt CDI for data import/export, this vulnerability undermines namespace isolation, a fundamental security boundary in Kubernetes. This can lead to data breaches, regulatory compliance violations, and loss of trust. The vulnerability is exploitable remotely with low complexity, increasing the risk of exploitation in multi-tenant or shared cluster environments. Although no known exploits are reported, the high CVSS score and scope change suggest a significant threat to cloud providers, enterprises, and managed service providers relying on these technologies.

Mitigation Recommendations

Organizations should immediately assess their use of Red Hat RHEL-9 CNV 4.19 with KubeVirt CDI and prioritize applying any available patches or updates from Red Hat once released. In the absence of patches, implement strict Role-Based Access Control (RBAC) policies to limit user privileges and restrict access to namespaces and PVC resources. Audit and monitor PVC cloning activities and DataImportCron jobs for unusual or unauthorized operations. Employ network segmentation and isolate critical namespaces to reduce the attack surface. Consider disabling or restricting the DataImportCron PVC source mechanism if not required. Regularly review Kubernetes cluster configurations and enforce the principle of least privilege for all users and service accounts. Stay informed through Red Hat security advisories and subscribe to vulnerability notifications for timely updates. Finally, conduct penetration testing and vulnerability assessments focused on Kubernetes storage and namespace isolation controls to identify potential exploitation paths.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-10T15:18:02.606Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6977c5a14623b1157cb6ff8a

Added to database: 1/26/2026, 7:50:57 PM

Last enriched: 2/27/2026, 11:19:03 AM

Last updated: 3/25/2026, 2:43:51 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses