{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T05:38:19.769","vulnerabilities":[{"cve":{"id":"CVE-2025-24376","sourceIdentifier":"security-advisories@github.com","published":"2025-01-30T16:15:31.630","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. By design, AdmissionPolicy and AdmissionPolicyGroup can evaluate only namespaced resources. The resources to be evaluated are determined by the rules provided by the user when defining the policy. There might be Kubernetes namespaced resources that should not be validated by AdmissionPolicy and by the AdmissionPolicyGroup policies because of their sensitive nature. For example, PolicyReport are namespaced resources that contain the list of non compliant objects found inside of a namespace. An attacker can use either an AdmissionPolicy or an AdmissionPolicyGroup to prevent the creation and update of PolicyReport objects to hide non-compliant resources. Moreover, the same attacker might use a mutating AdmissionPolicy to alter the contents of the PolicyReport created inside of the namespace. Starting from the 1.21.0 release, the validation rules applied to AdmissionPolicy and AdmissionPolicyGroup have been tightened to prevent them from validating sensitive types of namespaced resources."},{"lang":"es","value":"kubewarden-controller es un controlador de Kubernetes que le permite registrar dinámicamente las políticas de admisión de Kubewarden. Por diseño, AdmissionPolicy y AdmissionPolicyGroup solo pueden evaluar recursos con espacios de nombres. Los recursos que se evaluarán están determinados por las reglas proporcionadas por el usuario al definir la política. Puede haber recursos con espacios de nombres de Kubernetes que no deberían ser validados por AdmissionPolicy y por las políticas AdmissionPolicyGroup debido a su naturaleza confidencial. Por ejemplo, PolicyReport son recursos con espacios de nombres que contienen la lista de objetos no compatibles que se encuentran dentro de un espacio de nombres. Un atacante puede usar AdmissionPolicy o AdmissionPolicyGroup para evitar la creación y actualización de objetos PolicyReport para ocultar recursos no compatibles. Además, el mismo atacante podría usar una AdmissionPolicy mutada para alterar el contenido del PolicyReport creado dentro del espacio de nombres. A partir de la versión 1.21.0, se han endurecido las reglas de validación aplicadas a AdmissionPolicy y AdmissionPolicyGroup para evitar que validen tipos confidenciales de recursos con espacios de nombres."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-155"},{"lang":"en","value":"CWE-285"}]}],"references":[{"url":"https://github.com/kubewarden/kubewarden-controller/commit/8124039b5f0c955d0ee8c8ca12d4415282f02d2c","source":"security-advisories@github.com"},{"url":"https://github.com/kubewarden/kubewarden-controller/security/advisories/GHSA-fc89-jghx-8pvg","source":"security-advisories@github.com"}]}}]}