Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29773: CWE-863: Incorrect Authorization in kubewarden kubewarden-controller

0
Medium
VulnerabilityCVE-2026-29773cvecve-2026-29773cwe-863
Published: Mon Mar 09 2026 (03/09/2026, 22:23:57 UTC)
Source: CVE Database V5
Vendor/Project: kubewarden
Product: kubewarden-controller

Description

Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation. An attacker with privileged "AdmissionPolicy" create permissions (which isn't the default) could make use of 3 deprecated host-callback APIs: kubernetes/ingresses, kubernetes/namespaces, kubernetes/services. The attacker can craft a policy that exercises these deprecated API calls and would allow them read access to Ingresses, Namespaces, and Services resources respectively. This attack is read-only, there is no write capability and no access to Secrets, ConfigMaps, or other resource types beyond these three.

AI-Powered Analysis

AILast updated: 03/09/2026, 23:04:35 UTC

Technical Analysis

Kubewarden is a policy engine designed to enforce policies in Kubernetes clusters by allowing cluster operators to grant users permissions to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups. The vulnerability identified as CVE-2026-29773 arises from incorrect authorization checks in kubewarden-controller versions before 1.33.0. Specifically, an attacker who has been granted the ability to create AdmissionPolicies (a privileged permission not granted by default) can exploit three deprecated host-callback APIs—kubernetes/ingresses, kubernetes/namespaces, and kubernetes/services. By crafting a malicious AdmissionPolicy that invokes these deprecated APIs, the attacker can read information about Ingresses, Namespaces, and Services resources within the namespace. This read access could reveal potentially sensitive configuration and topology information about the cluster environment. However, the attacker cannot write or modify any resources, nor can they access more sensitive data such as Secrets or ConfigMaps. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the system fails to properly restrict access to certain operations. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited scope and read-only nature of the exploit, as well as the requirement for elevated privileges to exploit it. No known exploits have been reported in the wild, and no patches are explicitly linked, but upgrading to kubewarden-controller version 1.33.0 or later is recommended to address this issue.

Potential Impact

The primary impact of CVE-2026-29773 is unauthorized read access to Kubernetes Ingresses, Namespaces, and Services resources within a namespace. This could allow an attacker with AdmissionPolicy creation privileges to gather information about network routing, namespace configurations, and service endpoints, which may facilitate further reconnaissance or targeted attacks. Although the vulnerability does not allow modification or deletion of resources, nor access to highly sensitive data like Secrets or ConfigMaps, the leakage of cluster topology and configuration details can aid attackers in planning more sophisticated attacks. Organizations relying on kubewarden-controller for policy enforcement may face confidentiality risks if they grant AdmissionPolicy create permissions too broadly. The impact is limited to the namespace scope where the attacker has permissions, reducing the blast radius. Since exploitation requires already elevated permissions, the vulnerability primarily concerns environments with lax role-based access control (RBAC) policies. Overall, the risk is moderate but should not be ignored in sensitive or large-scale Kubernetes deployments.

Mitigation Recommendations

1. Upgrade kubewarden-controller to version 1.33.0 or later, where this vulnerability is fixed. 2. Restrict AdmissionPolicy create permissions strictly to trusted administrators; avoid granting these permissions to general users or service accounts. 3. Audit current RBAC policies to ensure that only necessary principals have AdmissionPolicy creation rights. 4. Disable or remove usage of deprecated host-callback APIs if possible, or monitor their invocation closely. 5. Implement Kubernetes audit logging to detect unusual AdmissionPolicy creations or suspicious API calls related to ingresses, namespaces, and services. 6. Use network segmentation and least privilege principles to limit the impact scope if a policy is maliciously crafted. 7. Regularly review and rotate credentials and permissions associated with kubewarden-controller to minimize risk exposure. 8. Educate cluster operators about the risks of granting AdmissionPolicy creation permissions and enforce strict change management processes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T16:26:02.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69af4e6aea502d3aa8cf7cc1

Added to database: 3/9/2026, 10:49:14 PM

Last enriched: 3/9/2026, 11:04:35 PM

Last updated: 3/13/2026, 5:06:43 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses