Cyber Posture

CVE-2025-29922

Critical

Published: 20 March 2025

Published
20 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0022 44.3th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-29922 affects kcp, a Kubernetes-like control plane designed for form-factors and use-cases beyond Kubernetes and container workloads. In versions prior to 0.26.3, the vulnerability enables unauthorized creation or deletion of pre-existing objects via the APIExport VirtualWorkspace in any arbitrary target workspace. By design, such operations should only be permitted if the workspace owner explicitly grants access through an APIBinding, but this flaw allows them even without an APIBinding or if a permission claim has been rejected. It is rated at CVSS 9.6 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N) and maps to CWE-285 (Improper Authorization).

A low-privileged remote attacker can exploit this vulnerability over the network with low complexity and no user interaction. By targeting the APIExport VirtualWorkspace mechanism, the attacker gains the ability to create or delete objects in arbitrary target workspaces, bypassing authorization controls and achieving high impacts on confidentiality and integrity across scoped boundaries.

The vulnerability has been addressed in kcp versions 0.26.3 and 0.27.0. Administrators should upgrade to these patched releases for mitigation. Additional details are available in the GitHub security advisory at GHSA-w2rr-38wv-8rrp, the fixing pull request #3338, and commit 614ecbf35f11db00f65391ab6fbb1547ca8b5d38.

Details

CWE(s)
CWE-285

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Authorization bypass in kcp APIExport VirtualWorkspace allows low-privileged remote attackers to create/delete objects in arbitrary workspaces without required APIBinding, directly enabling exploitation for privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References