Kyverno is a policy engine designed for cloud native platform engineering teams. In versions 1.14.1 and below, a Denial of Service (DoS) vulnerability exists due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | non_existent_function }}). This leads to a nil value being substituted into the policy structure. Subsequent processing by internal functions, specifically getValueAsStringMap, which expect string values, results in a panic due to a type assertion failure (interface {} is nil, not string). This crashes Kyverno worker threads in the admission controller and causes continuous crashes of the reports controller pod. This is fixed in version 1.14.2.
References
Link | Resource |
---|---|
https://github.com/kyverno/kyverno/commit/cbd7d4ca24de1c55396fc3295e9fc3215832be7c | Patch |
https://github.com/kyverno/kyverno/security/advisories/GHSA-r5p3-955p-5ggq | Vendor Advisory Exploit Mitigation |
https://github.com/kyverno/kyverno/security/advisories/GHSA-r5p3-955p-5ggq | Vendor Advisory Exploit Mitigation |
Configurations
History
05 Aug 2025, 15:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kyverno/kyverno/commit/cbd7d4ca24de1c55396fc3295e9fc3215832be7c - Patch | |
References | () https://github.com/kyverno/kyverno/security/advisories/GHSA-r5p3-955p-5ggq - Vendor Advisory, Exploit, Mitigation | |
CPE | cpe:2.3:a:kyverno:kyverno:*:*:*:*:*:*:*:* | |
First Time |
Kyverno kyverno
Kyverno |
|
Summary |
|
23 Jul 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-23 21:15
Updated : 2025-08-05 15:51
NVD link : CVE-2025-47281
Mitre link : CVE-2025-47281
CVE.ORG link : CVE-2025-47281
JSON object : View
Products Affected
kyverno
- kyverno