CVE-2025-24784
Linux openSUSE vulnerability analysis and mitigation

Overview

CVE-2025-24784 affects the kubewarden-controller, a Kubernetes controller that allows dynamic registration of Kubewarden admission policies. The vulnerability was discovered in version 1.17.0 and fixed in version 1.21.0. The issue involves the AdmissionPolicyGroup CRD (Custom Resource Definition) which allowed non-admin users to deploy context-aware policies that could query the Kubernetes API using the ServiceAccount of the Policy Server instance (GitHub Advisory).

Technical details

The vulnerability stems from the AdmissionPolicyGroup CRD's ability to deploy context-aware policies that can perform list and get operations against a Kubernetes cluster. These operations are executed using the ServiceAccount of the Policy Server instance hosting the policy, meaning access to the cluster is determined by the RBAC rules applied to that ServiceAccount. By default, the Kubewarden helm chart grants cluster-wide access to Namespace, Pod, Deployment, and Ingress resources (GitHub Advisory).

Impact

An attacker with the ability to create AdmissionPolicyGroup resources could potentially obtain information about resources that are outside their intended scope by leveraging the elevated access granted to the ServiceAccount token used to run the policy. The severity of the impact depends on the privileges granted to the ServiceAccount used to run the Policy Server (GitHub Advisory).

Mitigation and workarounds

The vulnerability is fixed in version 1.21.0, which removes the ability to define context-aware policies in AdmissionPolicyGroup CRD. For clusters running Kubewarden < 1.21.0, a workaround is available by applying a specific ClusterAdmissionPolicy that prevents the creation of AdmissionPolicyGroup resources with context-aware resources. The Kubewarden Audit Scanner can be used to identify existing non-compliant policies (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux openSUSE vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-15079MEDIUM5.3
  • cURLcURL
  • libcurl-devel
NoYesJan 08, 2026
CVE-2025-14819MEDIUM5.3
  • cURLcURL
  • libcurl-devel-32bit
NoYesJan 08, 2026
CVE-2025-14524MEDIUM5.3
  • cURLcURL
  • seal-curl
NoYesJan 08, 2026
CVE-2025-15224LOW3.1
  • cURLcURL
  • seal-curl
NoYesJan 08, 2026
CVE-2025-14017N/AN/A
  • cURLcURL
  • curl-minimal
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management