Vulnerability Description
Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation. An attacker with privileged "AdmissionPolicy" create permissions (which isn't the default) could make use of 3 deprecated host-callback APIs: kubernetes/ingresses, kubernetes/namespaces, kubernetes/services. The attacker can craft a policy that exercises these deprecated API calls and would allow them read access to Ingresses, Namespaces, and Services resources respectively. This attack is read-only, there is no write capability and no access to Secrets, ConfigMaps, or other resource types beyond these three.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Kubewarden | >= 1.6.0, < 1.33.0 |
Related Weaknesses (CWE)
References
- https://github.com/kubewarden/kubewarden-controller/commit/4e41b60ae44902d82d941Patch
- https://github.com/kubewarden/kubewarden-controller/pull/1519Issue TrackingPatch
- https://github.com/kubewarden/kubewarden-controller/security/advisories/GHSA-6r7MitigationVendor Advisory
FAQ
What is CVE-2026-29773?
CVE-2026-29773 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of K...
How severe is CVE-2026-29773?
CVE-2026-29773 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29773?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Kubewarden.