CVE-2026-29773: CWE-863: Incorrect Authorization in kubewarden kubewarden-controller
Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation. An attacker with privileged "AdmissionPolicy" create permissions (which isn't the default) could make use of 3 deprecated host-callback APIs: kubernetes/ingresses, kubernetes/namespaces, kubernetes/services. The attacker can craft a policy that exercises these deprecated API calls and would allow them read access to Ingresses, Namespaces, and Services resources respectively. This attack is read-only, there is no write capability and no access to Secrets, ConfigMaps, or other resource types beyond these three.
AI Analysis
Technical Summary
Kubewarden is a policy engine designed to enforce policies in Kubernetes clusters by allowing cluster operators to grant users permissions to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups. The vulnerability identified as CVE-2026-29773 arises from incorrect authorization checks in kubewarden-controller versions before 1.33.0. Specifically, an attacker who has been granted the ability to create AdmissionPolicies (a privileged permission not granted by default) can exploit three deprecated host-callback APIs—kubernetes/ingresses, kubernetes/namespaces, and kubernetes/services. By crafting a malicious AdmissionPolicy that invokes these deprecated APIs, the attacker can read information about Ingresses, Namespaces, and Services resources within the namespace. This read access could reveal potentially sensitive configuration and topology information about the cluster environment. However, the attacker cannot write or modify any resources, nor can they access more sensitive data such as Secrets or ConfigMaps. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the system fails to properly restrict access to certain operations. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited scope and read-only nature of the exploit, as well as the requirement for elevated privileges to exploit it. No known exploits have been reported in the wild, and no patches are explicitly linked, but upgrading to kubewarden-controller version 1.33.0 or later is recommended to address this issue.
Potential Impact
The primary impact of CVE-2026-29773 is unauthorized read access to Kubernetes Ingresses, Namespaces, and Services resources within a namespace. This could allow an attacker with AdmissionPolicy creation privileges to gather information about network routing, namespace configurations, and service endpoints, which may facilitate further reconnaissance or targeted attacks. Although the vulnerability does not allow modification or deletion of resources, nor access to highly sensitive data like Secrets or ConfigMaps, the leakage of cluster topology and configuration details can aid attackers in planning more sophisticated attacks. Organizations relying on kubewarden-controller for policy enforcement may face confidentiality risks if they grant AdmissionPolicy create permissions too broadly. The impact is limited to the namespace scope where the attacker has permissions, reducing the blast radius. Since exploitation requires already elevated permissions, the vulnerability primarily concerns environments with lax role-based access control (RBAC) policies. Overall, the risk is moderate but should not be ignored in sensitive or large-scale Kubernetes deployments.
Mitigation Recommendations
1. Upgrade kubewarden-controller to version 1.33.0 or later, where this vulnerability is fixed. 2. Restrict AdmissionPolicy create permissions strictly to trusted administrators; avoid granting these permissions to general users or service accounts. 3. Audit current RBAC policies to ensure that only necessary principals have AdmissionPolicy creation rights. 4. Disable or remove usage of deprecated host-callback APIs if possible, or monitor their invocation closely. 5. Implement Kubernetes audit logging to detect unusual AdmissionPolicy creations or suspicious API calls related to ingresses, namespaces, and services. 6. Use network segmentation and least privilege principles to limit the impact scope if a policy is maliciously crafted. 7. Regularly review and rotate credentials and permissions associated with kubewarden-controller to minimize risk exposure. 8. Educate cluster operators about the risks of granting AdmissionPolicy creation permissions and enforce strict change management processes.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, Netherlands, France, India, South Korea
CVE-2026-29773: CWE-863: Incorrect Authorization in kubewarden kubewarden-controller
Description
Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation. An attacker with privileged "AdmissionPolicy" create permissions (which isn't the default) could make use of 3 deprecated host-callback APIs: kubernetes/ingresses, kubernetes/namespaces, kubernetes/services. The attacker can craft a policy that exercises these deprecated API calls and would allow them read access to Ingresses, Namespaces, and Services resources respectively. This attack is read-only, there is no write capability and no access to Secrets, ConfigMaps, or other resource types beyond these three.
AI-Powered Analysis
Technical Analysis
Kubewarden is a policy engine designed to enforce policies in Kubernetes clusters by allowing cluster operators to grant users permissions to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups. The vulnerability identified as CVE-2026-29773 arises from incorrect authorization checks in kubewarden-controller versions before 1.33.0. Specifically, an attacker who has been granted the ability to create AdmissionPolicies (a privileged permission not granted by default) can exploit three deprecated host-callback APIs—kubernetes/ingresses, kubernetes/namespaces, and kubernetes/services. By crafting a malicious AdmissionPolicy that invokes these deprecated APIs, the attacker can read information about Ingresses, Namespaces, and Services resources within the namespace. This read access could reveal potentially sensitive configuration and topology information about the cluster environment. However, the attacker cannot write or modify any resources, nor can they access more sensitive data such as Secrets or ConfigMaps. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the system fails to properly restrict access to certain operations. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited scope and read-only nature of the exploit, as well as the requirement for elevated privileges to exploit it. No known exploits have been reported in the wild, and no patches are explicitly linked, but upgrading to kubewarden-controller version 1.33.0 or later is recommended to address this issue.
Potential Impact
The primary impact of CVE-2026-29773 is unauthorized read access to Kubernetes Ingresses, Namespaces, and Services resources within a namespace. This could allow an attacker with AdmissionPolicy creation privileges to gather information about network routing, namespace configurations, and service endpoints, which may facilitate further reconnaissance or targeted attacks. Although the vulnerability does not allow modification or deletion of resources, nor access to highly sensitive data like Secrets or ConfigMaps, the leakage of cluster topology and configuration details can aid attackers in planning more sophisticated attacks. Organizations relying on kubewarden-controller for policy enforcement may face confidentiality risks if they grant AdmissionPolicy create permissions too broadly. The impact is limited to the namespace scope where the attacker has permissions, reducing the blast radius. Since exploitation requires already elevated permissions, the vulnerability primarily concerns environments with lax role-based access control (RBAC) policies. Overall, the risk is moderate but should not be ignored in sensitive or large-scale Kubernetes deployments.
Mitigation Recommendations
1. Upgrade kubewarden-controller to version 1.33.0 or later, where this vulnerability is fixed. 2. Restrict AdmissionPolicy create permissions strictly to trusted administrators; avoid granting these permissions to general users or service accounts. 3. Audit current RBAC policies to ensure that only necessary principals have AdmissionPolicy creation rights. 4. Disable or remove usage of deprecated host-callback APIs if possible, or monitor their invocation closely. 5. Implement Kubernetes audit logging to detect unusual AdmissionPolicy creations or suspicious API calls related to ingresses, namespaces, and services. 6. Use network segmentation and least privilege principles to limit the impact scope if a policy is maliciously crafted. 7. Regularly review and rotate credentials and permissions associated with kubewarden-controller to minimize risk exposure. 8. Educate cluster operators about the risks of granting AdmissionPolicy creation permissions and enforce strict change management processes.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T16:26:02.897Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69af4e6aea502d3aa8cf7cc1
Added to database: 3/9/2026, 10:49:14 PM
Last enriched: 3/9/2026, 11:04:35 PM
Last updated: 3/13/2026, 5:06:43 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.