


Perceptive Security
SOC/SIEM Consultancy

Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.17.2 and 1.16.4, an unchecked type assertion in the `forEac…
Published:
23 april 2026 om 22:00:00
Alert date:
24 april 2026 om 15:07:56
Source:
nvd.nist.gov
Cloud & Virtualization, Security Tools
A vulnerability in Kyverno policy engine versions prior to 1.17.2 and 1.16.4 allows users with policy creation permissions to crash the cluster-wide background controller through an unchecked type assertion in the forEach mutation handler. The bug causes persistent CrashLoopBackOff states and blocks resource operations by dropping admission controller connections. The vulnerability affects only the legacy engine, while CEL-based policies remain unaffected. The crash loop continues until the malicious policy is deleted, making it a significant availability threat for Kubernetes clusters using Kyverno.
Technical details
Mitigation steps:
Affected products:
Kyverno
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41485
https://github.com/kyverno/kyverno/commit/76c8fdbe87328722e099e1fd44c3f21c9f7809cb
https://github.com/kyverno/kyverno/commit/80e728c2283a0c65e5adb02d8a907106e6ebe7e3
https://github.com/kyverno/kyverno/security/advisories/GHSA-fpjq-c37h-cqcv
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
