Kyverno Privilege Escalation: RBAC Bypass in Multi-Tenant Clusters
The National Vulnerability Database has disclosed CVE-2026-41068, a high-severity privilege escalation vulnerability in Kyverno, a policy engine for cloud-native platforms. Rated 7.7 CVSS, this flaw allows a namespace administrator to bypass Kubernetes RBAC and read ConfigMaps from any namespace. This is a critical issue for multi-tenant Kubernetes environments.
The vulnerability stems from insufficient validation in Kyverno’s configMap.namespace field within its ConfigMap context loader. While a previous patch (CVE-2026-22039) addressed a similar issue in the apiCall context by validating URLPath, the ConfigMap context was overlooked. This allows an attacker to leverage Kyverno’s privileged service account to achieve a complete RBAC bypass.
For defenders, this means an attacker with namespace admin privileges can escalate to gain unauthorized access to sensitive configurations across the cluster. The National Vulnerability Database confirms a fix is available in Kyverno version 1.17.2. Organizations running Kyverno in multi-tenant Kubernetes clusters must prioritize this update.
What This Means For You
- If your organization uses Kyverno in a multi-tenant Kubernetes cluster, you need to immediately patch to version 1.17.2 or higher. This vulnerability allows a namespace administrator to read ConfigMaps from *any* namespace, effectively bypassing RBAC and potentially exposing sensitive configurations. Audit your Kyverno deployments and ensure the fix is applied to prevent cross-namespace privilege escalation.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Kyverno RBAC Bypass via ConfigMap Read - CVE-2026-41068
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41068 | Privilege Escalation | Kyverno policy engine |
| CVE-2026-41068 | Auth Bypass | Kyverno ConfigMap context loader with 'configMap.namespace' field |
| CVE-2026-41068 | Privilege Escalation | Kyverno versions prior to 1.17.2 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 24, 2026 at 07:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.