Kubewarden vulnerable to RBAC Reconnaissance via unchecked can_i host capability call — CVE-2026-42541
GitHub · GitHub · CVE-2026-42541
ID
CVE-2026-42541
CVE-2026-42541
Date
Updated
Activity
Source
GitHub
GitHub
Vendor
GitHub
GitHub
Threat
medium
medium
CVSS
4.3
4.3
EPSS
0.00021
0.00021
Summary
### Impact Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation. An attacker with privileged AdmissionPolicy or AdmissionPolicyGroup create…
Product
go: github.com/kubewarden/kubewarden-controller
What to do
General, cautious steps (verify details in the official source):
- Review exposure and plan remediation based on risk and environment.
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.