TopVuln

High-risk vulnerability digests

CVE-2026-41068

  • HIGH

Details

CVSS v3
7.7
NVD published
2026-04-24 04:16:19
EPSS
<0.1% probability · 9.8th percentile — 2026-05-12
Affected versions
Kyverno < 1.17.2
Summary
This vulnerability exists in the Kyverno Kubernetes policy engine, where the ConfigMap context loader fails to validate the input namespace field. A malicious namespace administrator can abuse this flaw to read ConfigMaps from any namespace in the cluster using Kyverno's privileged service account. This results in a complete RBAC bypass for multi-tenant Kubernetes clusters.
Remediation
Upgrade Kyverno to version 1.17.2 or later to apply the required fix. Until the upgrade is completed, restrict permissions for untrusted users to create policies that use Kyverno's ConfigMap context loading feature.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.