CVE-2025-47281
Wolfi vulnerability analysis and mitigation

Overview

Kyverno, a policy engine designed for cloud native platform engineering teams, was found to contain a Denial of Service (DoS) vulnerability (CVE-2025-47281) in versions 1.14.1 and below. The vulnerability was discovered on July 23, 2025, and affects the handling of JMESPath variable substitutions (GitHub Advisory, NVD).

Technical details

The vulnerability exists due to improper handling of JMESPath variable substitutions in the getValueAsStringMap function. When attackers craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | nonexistentfunction}}), it leads to a nil value being substituted into the policy structure. The subsequent processing by internal functions results in a panic due to a type assertion failure when interface {} is nil, not string. The vulnerability has been assigned a CVSS v3.1 base score of 7.7 (High) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H (GitHub Advisory).

Impact

The vulnerability causes crashes in Kyverno worker threads in the admission controller and leads to continuous crashes of the reports controller pod. In Enforce mode, this can result in full admission controller unavailability. The impact includes degraded policy enforcement, inability to create/update resources, and loss of policy reporting visibility (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 1.14.2. The fix includes proper nil checking before type assertions and uses type switching to safely handle non-string values. Organizations are advised to upgrade to this version or later (GitHub Patch, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Wolfi vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66471HIGH8.9
  • PythonPython
  • py3-urllib3
NoYesDec 05, 2025
CVE-2025-66418HIGH8.9
  • PythonPython
  • python-urllib3
NoYesDec 05, 2025
CVE-2025-66564HIGH7.5
  • Datadog AgentDatadog Agent
  • cosign
NoYesDec 04, 2025
CVE-2025-66490MEDIUM6.9
  • WolfiWolfi
  • traefik-3
NoYesDec 09, 2025
CVE-2025-66491MEDIUM5.9
  • WolfiWolfi
  • traefik
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management