{"id":"CVE-2024-48921","summary":"Kyverno's PolicyException objects can be created in any namespace by default","details":"Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterPolicy, ie. \"disallow-privileged-containers,\" can be overridden by the creation of a PolicyException in a random namespace. By design, PolicyExceptions are consumed from any namespace. Administrators may not recognize that this allows users with privileges to non-kyverno namespaces to create exceptions. This vulnerability is fixed in 1.13.0.","aliases":["BIT-kyverno-2024-48921","GHSA-qjvc-p88j-j9rm","GO-2024-3230"],"modified":"2026-04-10T05:17:48.242391Z","published":"2024-10-29T14:14:36.260Z","related":["CGA-qfx8-48h9-gfrw","SUSE-SU-2024:3911-1","openSUSE-SU-2024:0350-1","openSUSE-SU-2024:14447-1"],"database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-285"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/48xxx/CVE-2024-48921.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/48xxx/CVE-2024-48921.json"},{"type":"ADVISORY","url":"https://github.com/kyverno/kyverno/security/advisories/GHSA-qjvc-p88j-j9rm"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-48921"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kyverno/kyverno","events":[{"introduced":"0"},{"fixed":"978c2f3b56df37a8bea4ee649369efaea53a684b"}]}],"versions":["1.3.0-rc10","1.6-dev","1.7-dev","1.8-dev","1.9-dev","helm-chart-v2.0.3","helm-chart-v2.0.3-rc1","helm-chart-v2.0.3-rc2","helm-chart-v2.1.0","helm-chart-v2.1.3","kyverno-chart-3.3.0-beta.1","kyverno-chart-3.3.0-rc.1","kyverno-chart-3.3.0-rc.2","kyverno-chart-3.3.0-rc.3","kyverno-policies-chart-3.3.0-beta.1","kyverno-policies-chart-3.3.0-rc.1","kyverno-policies-chart-3.3.0-rc.2","kyverno-policies-chart-3.3.0-rc.3","test-dev","v0.1.0","v0.10.0","v0.11.0","v0.2.0","v0.3.0","v0.4.0","v0.5.0","v0.7.0","v0.7.1","v0.8.0","v0.9.0","v0.9.1","v1.0.0","v1.0.0-rc1","v1.1.1","v1.1.10","v1.1.11","v1.1.12","v1.1.2","v1.1.3","v1.1.3-rc1","v1.1.4","v1.1.4-rc1","v1.1.5","v1.1.6","v1.1.6-rc1","v1.1.6-rc2","v1.1.6-rc3","v1.1.6-rc4","v1.1.6-rc5","v1.1.7","v1.1.7-rc1","v1.1.7-rc2","v1.1.7-rc3","v1.1.7-rc4","v1.1.8","v1.1.9","v1.13.0-beta.1","v1.13.0-rc.1","v1.13.0-rc.2","v1.13.0-rc.3","v1.2.0","v1.2.1","v1.3.0","v1.3.0-rc1","v1.3.0-rc10","v1.3.0-rc11","v1.3.0-rc12","v1.3.0-rc2","v1.3.0-rc3","v1.3.0-rc4","v1.3.0-rc5","v1.3.0-rc6","v1.3.0-rc7","v1.3.0-rc8","v1.3.0-rc9","v1.3.1","v1.3.2","v1.3.2-rc1","v1.3.2-rc2","v1.3.2-rc3","v1.3.3","v1.3.4","v1.3.4-rc1","v1.3.5","v1.3.5-rc1","v1.3.5-rc2","v1.3.5-rc3","v1.3.5-rc4","v1.3.5-rc5","v1.3.6","v1.3.6-rc1","v1.3.6-rc2","v1.3.6-rc3","v1.3.6-rc4","v1.3.6-rc5","v1.4.0","v1.4.0-rc1","v1.4.0-rc2","v1.4.0-rc3","v1.4.0-rc4","v1.4.1","v1.4.2","v1.4.2-rc1","v1.4.2-rc2","v1.4.2-rc3","v1.4.2-rc4","v1.4.3","v1.4.3-rc1","v1.4.3-rc2","v1.5.0-rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-48921.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"}]}