{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T09:45:14.774","vulnerabilities":[{"cve":{"id":"CVE-2025-29778","sourceIdentifier":"security-advisories@github.com","published":"2025-03-24T17:15:20.970","lastModified":"2025-08-01T13:10:56.737","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to version 1.14.0-alpha.1, Kyverno ignores subjectRegExp and IssuerRegExp while verifying artifact's sign with keyless mode. It allows the attacker to deploy kubernetes resources with the artifacts that were signed by unexpected certificate. Deploying these unauthorized kubernetes resources can lead to full compromise of kubernetes cluster. Version 1.14.0-alpha.1 contains a patch for the issue."},{"lang":"es","value":"Kyverno es un motor de políticas diseñado para equipos de ingeniería de plataformas nativas de la nube. Antes de la versión 1.14.0-alpha.1, Kyverno ignoraba subjectRegExp y IssuerRegExp al verificar la firma de artefactos con el modo sin clave. Esto permite al atacante implementar recursos de Kubernetes con artefactos firmados por un certificado inesperado. Implementar estos recursos de Kubernetes no autorizados puede comprometer por completo el clúster de Kubernetes. La versión 1.14.0-alpha.1 incluye un parche para este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.3,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-285"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kyverno:kyverno:*:*:*:*:*:*:*:*","versionStartIncluding":"1.13.0","versionEndExcluding":"1.13.6","matchCriteriaId":"1BDA4D3F-2144-4904-8BD8-26A15B0401B2"}]}]}],"references":[{"url":"https://github.com/Mohdcode/kyverno/blob/373f942ea9fa8b63140d0eb0e101b9a5f71033f3/pkg/cosign/cosign.go#L537","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/kyverno/kyverno/commit/8777672fb17bdf252bd2e7d8de3441e240404a60","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/kyverno/kyverno/pull/12237","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/kyverno/kyverno/security/advisories/GHSA-46mp-8w32-6g94","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/kyverno/policies/issues/1246","source":"security-advisories@github.com","tags":["Exploit","Issue Tracking"]}]}}]}