Cyber Posture

CVE-2025-29778

MediumPublic PoC

Published: 24 March 2025

Published
24 March 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 5.8 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N
EPSS Score 0.0009 25.9th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may deploy a container into an environment to facilitate execution or evade defenses.

Security Summary

CVE-2025-29778 is a vulnerability in Kyverno, a policy engine designed for cloud native platform engineering teams, affecting versions prior to 1.14.0-alpha.1. In keyless mode, Kyverno ignores the subjectRegExp and IssuerRegExp parameters during artifact signature verification. This improper authorization flaw, classified under CWE-285, enables the deployment of Kubernetes resources using artifacts signed by unexpected certificates.

Exploitation is possible over the network (AV:N) by attackers with high privileges (PR:H), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful attacks allow deployment of unauthorized Kubernetes resources, resulting in high integrity impact (I:H), changed scope (S:C), and potential full compromise of the Kubernetes cluster.

Kyverno version 1.14.0-alpha.1 includes a patch for the issue, as detailed in the associated GitHub security advisory (GHSA-46mp-8w32-6g94), commit (8777672fb17bdf252bd2e7d8de3441e240404a60), and pull request (#12237). Practitioners should upgrade to the patched version to mitigate the vulnerability.

Details

CWE(s)
CWE-285

Affected Products

kyverno
kyverno
1.13.0 — 1.13.6

MITRE ATT&CK Enterprise Techniques

T1211 Exploitation for Stealth Stealth
Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within trusted or unmonitored components.
T1610 Deploy Container Execution
Adversaries may deploy a container into an environment to facilitate execution or evade defenses.
Why these techniques?

Vulnerability bypasses Kyverno signature verification (subjectRegExp/IssuerRegExp), enabling unauthorized container deployments (T1610) and defense evasion via policy bypass (T1211) with scope change to full cluster compromise.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References