Report: CVE-2026-41323 - Kyverno: ServiceAccount token leaked to external servers via apiCall service URL

Report: CVE-2026-41323 - Kyverno: ServiceAccount token leaked to external servers via apiCall service URL

CVE ID :CVE-2026-41323 Published : April 24, 2026, 4:16 a.m. | 1 hour, 33 minutes ago Description :Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissions to patch webhook configurations, a stolen token leads to full cluster compromise. Versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4 patch the issue. Severity: 8.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
April 24, 2026