Skip to main content

Kubernetes CVE Tracker

High- and critical-severity CVEs affecting kubernetes/kubernetes, cilium/cilium, containerd/containerd, falcosecurity/falco, and kyverno/kyverno. Pages publish within 24 hours of public disclosure with impact, affected versions, detection guidance, and mitigation.

Last reviewed: 19 CVEs tracked

CVESeverityProjectsDisclosedSummary
CVE-2026-41520HIGH7.9ciliumSensitive information included in cilium-bugtool debug archive
CVE-2026-41485HIGH7.7kyvernoKyverno Controller Denial of Service via forEach Mutation Panic
CVE-2026-41323HIGH8.1kyvernoServiceAccount token leaked to external servers via apiCall service URL
CVE-2026-41068HIGH7.7kyvernoCross-Namespace Read Bypasses RBAC Isolation (CVE-2026-22039 Incomplete Fix)
CVE-2026-40868HIGH8.1kyvernokyverno apicall servicecall implicit bearer token injection leaks kyverno serviceaccount token
CVE-2026-4789HIGH8.5kyvernoSSRF via CEL http.Get/http.Post in NamespacedValidatingPolicy allows cross-namespace data access
CVE-2026-22039CRITICAL10.0kyvernoKyverno Cross-Namespace Privilege Escalation via Policy apiCall
CVE-2026-23881HIGH7.7kyvernoKyverno Denial of Service via Context Variable Amplification in Policy Engine
CVE-2025-47281HIGH7.7kyvernoKyverno Denial of Service via Improper JMESPath Variable Evaluation
CVE-2025-47290CRITICALcontainerdHost filesystem access during image unpack
CVE-2025-46342HIGH8.6kyvernoBypass of policy rules that use namespace selectors in match statements
CVE-2024-37307HIGH7.9ciliumSensitive information leak in cilium-bugtool
CVE-2024-28860HIGH8.0ciliumInsecure IPsec transport encryption in Cilium
CVE-2024-28248HIGH7.2ciliumIntermittent HTTP policy bypass
CVE-2023-47630HIGH7.1kyvernoAttacker can cause Kyverno user to unintentionally consume insecure image
CVE-2023-29002HIGH7.2ciliumDebug mode leaks confidential data in Cilium
CVE-2022-47633HIGHkyvernoBypass of verifyImages rule possible with malicious proxy/registry
CVE-2022-29179HIGH7.6ciliumUser with root privileges on node can leverage permissions of Cilium ClusterRole
CVE-2021-43816HIGHcontainerdcontainerd CRI plugin: Unprivileged pod using `hostPath` can side-step SELinux

How the Tracker Works

  • Polls GitHub Security Advisories (GHSA) for the five upstream projects on an hourly cron.
  • Auto-publishes HIGH and CRITICAL CVEs as pull requests for human review before merge.
  • Each page contains only facts from the GHSA payload — affected versions, fixed versions, severity, references — plus prose impact / detection / mitigation derived from the same payload.
  • MEDIUM and LOW are not currently tracked individually.
  • Pages are immutable URLs — when a CVE is updated upstream, the page is refreshed in place rather than re-published at a new path.