Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f9g8-6ppc-pqq4 | Kyverno: ServiceAccount token leaked to external servers via apiCall service URL |
Mon, 27 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kyverno
Kyverno kyverno |
|
| CPEs | cpe:2.3:a:kyverno:kyverno:*:*:*:*:*:*:*:* cpe:2.3:a:kyverno:kyverno:*:-:*:*:*:*:*:* |
|
| Vendors & Products |
Kyverno
Kyverno kyverno |
Fri, 24 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissions to patch webhook configurations, a stolen token leads to full cluster compromise. Versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4 patch the issue. | |
| Title | Kyverno: ServiceAccount token leaked to external servers via apiCall service URL | |
| Weaknesses | CWE-200 CWE-918 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T12:05:00.276Z
Reserved: 2026-04-20T14:01:46.672Z
Link: CVE-2026-41323
Updated: 2026-04-24T12:04:41.403Z
Status : Analyzed
Published: 2026-04-24T04:16:20.593
Modified: 2026-04-27T17:53:22.783
Link: CVE-2026-41323
No data.
OpenCVE Enrichment
Updated: 2026-04-28T14:30:33Z
Github GHSA