CVE-2026-29773: Kubewarden: Cross-namespace data exfiltration via deprecated host callback binding
(updated )
Kubewarden is a policy engine for Kubernetes. Kubewarden cluster operators can grant permissions to users to deploy namespaced AdmissionPolicies and AdmissionPolicyGroups in their Namespaces. One of Kubewarden promises is that configured users can deploy namespaced policies in a safe manner, without privilege escalation.
An attacker with privileged “AdmissionPolicy” create permissions (which isn’t the default) could make use of 3 deprecated host-callback APIs: kubernetes/ingresses, kubernetes/namespaces, kubernetes/services.
The attacker can craft a policy that exercises these deprecated API calls and would allow them read access to Ingresses, Namespaces, and Services resources respectively.
This attack is read-only, there is no write capability and no access to Secrets, ConfigMaps, or other resource types beyond these three. The attacker could read for example:
- Namespace names and labels.
- Services across all namespaces with ClusterIPs and ports to reveal cluster internal topology.
- Ingresses across all namespaces with hostnames and routing rules.
References
- github.com/advisories/GHSA-6r7f-3fwq-hq74
- github.com/kubewarden/kubewarden-controller
- github.com/kubewarden/kubewarden-controller/commit/4e41b60ae44902d82d94101bac93fb77cae65651
- github.com/kubewarden/kubewarden-controller/pull/1519
- github.com/kubewarden/kubewarden-controller/security/advisories/GHSA-6r7f-3fwq-hq74
- nvd.nist.gov/vuln/detail/CVE-2026-29773
Code Behaviors & Features
Detect and mitigate CVE-2026-29773 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →