CVE-2022-47633
Description
An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Kyverno 1.8.3 and 1.8.4 have an image signature validation bypass allowing injection of unsigned container images; fixed in 1.8.5.
Vulnerability
Description CVE-2022-47633 is an image signature validation bypass in Kyverno versions 1.8.3 and 1.8.4. The flaw allows an attacker to inject unsigned arbitrary container images into a protected Kubernetes cluster by exploiting a weakness in how Kyverno validates image signatures [1].
Exploitation
Scenario A malicious image registry or a man-in-the-middle attacker can exploit this vulnerability to bypass signature verification. The attack does not require authentication to Kyverno, but requires the ability to intercept or control image pulls [1].
Impact
Successful exploitation results in the deployment of unsigned container images within the cluster, potentially undermining supply chain security and allowing unauthorized code execution [1].
Mitigation
The vulnerability is fixed in Kyverno version 1.8.5 [2]. The fix addresses the signature validation logic and was applied in commits linked to the release [3][4]. Users of affected versions should upgrade immediately; mitigation steps are available for impacted releases [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/kyverno/kyvernoGo | >= 1.8.3, < 1.8.5 | 1.8.5 |
Affected products
3- Kyverno/Kyvernodescription
- osv-coords2 versions
>= 1.8.3, <= 1.8.3+ 1 more
- (no CPE)range: >= 1.8.3, <= 1.8.3
- (no CPE)range: >= 1.8.3, < 1.8.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- github.com/advisories/GHSA-m3cq-xcx9-3gvmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-47633ghsaADVISORY
- github.com/kyverno/kyverno/compare/v1.8.4...v1.8.5ghsaWEB
- github.com/kyverno/kyverno/pull/5713ghsaWEB
- github.com/kyverno/kyverno/releases/tag/v1.8.5ghsaWEB
- github.com/kyverno/kyverno/security/advisories/GHSA-m3cq-xcx9-3gvmghsaWEB
- kyverno.io/docs/writing-policies/verify-imagesghsaWEB
- kyverno.io/policies/best-practices/restrict_image_registries/restrict_image_registriesghsaWEB
- pkg.go.dev/vuln/GO-2022-1180ghsaWEB
- web.archive.org/web/20230426095744/https://kyverno.io/policies/best-practices/restrict_image_registries/restrict_image_registriesghsaWEB
- kyverno.io/docs/writing-policies/verify-images/mitre
News mentions
0No linked articles in our index yet.