logo

CVE-2025-4563 k8s.io/kubernetes

Package

Manager: go
Name: k8s.io/kubernetes
Vulnerable Version: >=1.32.0 <1.32.6 || >=1.33.0 <1.33.2

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00028 pctl0.06234

Details

kubernetes allows nodes to bypass dynamic resource allocation authorization checks A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

Metadata

Created: 2025-06-23T18:30:26Z
Modified: 2025-08-06T21:47:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-hj2p-8wj8-pfq4/GHSA-hj2p-8wj8-pfq4.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-hj2p-8wj8-pfq4
Finding: F006
Auto approve: 1