CVE-2025-4563 – k8s.io/kubernetes
Package
Manager: go
Name: k8s.io/kubernetes
Vulnerable Version: >=1.32.0 <1.32.6 || >=1.33.0 <1.33.2
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00028 pctl0.06234
Details
kubernetes allows nodes to bypass dynamic resource allocation authorization checks A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.
Metadata
Created: 2025-06-23T18:30:26Z
Modified: 2025-08-06T21:47:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-hj2p-8wj8-pfq4/GHSA-hj2p-8wj8-pfq4.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-hj2p-8wj8-pfq4
Finding: F006
Auto approve: 1