Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. kubevirt.io/kubevirt
  4. ›
  5. CVE-2026-6383

CVE-2026-6383: KubeVirt's authorization mechanism improperly truncates subresource names

April 15, 2026 (updated April 16, 2026)

A flaw was found in KubeVirt’s Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, potentially disclosing sensitive information or performing actions they are not permitted to do. Additionally, legitimate users may be denied access to resources.

References

  • access.redhat.com/security/cve/CVE-2026-6383
  • bugzilla.redhat.com/show_bug.cgi?id=2458741
  • github.com/advisories/GHSA-j6cv-3w8p-vrg8
  • github.com/kubevirt/kubevirt
  • github.com/kubevirt/kubevirt/issues/17337
  • nvd.nist.gov/vuln/detail/CVE-2026-6383

Code Behaviors & Features

Detect and mitigate CVE-2026-6383 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.8.1

Solution

Unfortunately, there is no solution available yet.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

go/kubevirt.io/kubevirt/CVE-2026-6383.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:07 +0000.