VYPR

Go modules package

kubevirt.io/kubevirt

pkg:golang/kubevirt.io/kubevirt

Vulnerabilities (15)

  • CVE-2026-6383MedApr 15, 2026
    affected <= 1.8.1

    A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized acces

  • CVE-2025-14525MedJan 26, 2026
    affected <= 1.7.0

    A flaw was found in kubevirt. A user within a virtual machine (VM), if the guest agent is active, can exploit this by causing the agent to report an excessive number of network interfaces. This action can overwhelm the system's ability to store VM configuration updates, effective

  • CVE-2025-64324Nov 18, 2025
    affected < 1.6.1fixed 1.6.1

    KubeVirt is a virtual machine management add-on for Kubernetes. The `hostDisk` feature in KubeVirt allows mounting a host file or directory owned by the user with UID 107 into a VM. However, prior to version 1.6.1 and 1.7.0, the implementation of this feature and more specificall

  • CVE-2025-64433Nov 7, 2025
    affected < 1.5.3fixed 1.5.3

    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, a vulnerability was discovered that allows a VM to read arbitrary files from the virt-launcher pod's file system. This issue stems from improper symlink handling when mounting PVC disks into

  • CVE-2025-64437Nov 7, 2025
    affected < 1.5.3fixed 1.5.3

    KubeVirt is a virtual machine management add-on for Kubernetes. In versions before 1.5.3 and 1.6.1, the virt-handler does not verify whether the launcher-sock is a symlink or a regular file. This oversight can be exploited, for example, to change the ownership of arbitrary files

  • CVE-2025-64436Nov 7, 2025
    affected < 1.7.0fixed 1.7.0

    KubeVirt is a virtual machine management add-on for Kubernetes. In 1.5.0 and earlier, the permissions granted to the virt-handler service account, such as the ability to update VMI and patch nodes, could be abused to force a VMI migration to an attacker-controlled node. This vuln

  • CVE-2025-64435Nov 7, 2025
    affected < 1.7.0-beta.0fixed 1.7.0-beta.0

    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.7.0-beta.0, a logic flaw in the virt-controller allows an attacker to disrupt the control over a running VMI by creating a pod with the same labels as the legitimate virt-launcher pod associated with the V

  • CVE-2025-64434Nov 7, 2025
    affected < 1.5.3fixed 1.5.3

    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api a

  • CVE-2025-64432Nov 7, 2025
    affected < 1.5.3fixed 1.5.3

    KubeVirt is a virtual machine management add-on for Kubernetes. Versions 1.5.3 and below, and 1.6.0 contained a flawed implementation of the Kubernetes aggregation layer's authentication flow which could enable bypass of RBAC controls. It was discovered that the virt-api componen

  • CVE-2024-33394May 2, 2024
    affected <= 1.2.0

    An issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component.

  • CVE-2024-31420MedApr 3, 2024
    affected <= 1.2.0

    A NULL pointer dereference flaw was found in KubeVirt. This flaw allows an attacker who has access to a virtual machine guest on a node with DownwardMetrics enabled to cause a denial of service by issuing a high number of calls to vm-dump-metrics --virtio and then deleting the vi

  • CVE-2023-26484Mar 15, 2023
    affected <= 0.59.0

    KubeVirt is a virtual machine management add-on for Kubernetes. In versions 0.59.0 and prior, if a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs. This

  • CVE-2022-1798Sep 15, 2022
    affected >= 0.20.0, < 0.55.1fixed 0.55.1

    A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms allows a user able to configure the kubevirt to read arbitrary files on the host filesystem which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not

  • CVE-2020-1701May 27, 2021
    affected < 0.26.0fixed 0.26.0

    A flaw was found in the KubeVirt main virt-handler versions before 0.26.0 regarding the access permissions of virt-handler. An attacker with access to create VMs could attach any secret within their namespace, allowing them to read the contents of that secret.

  • CVE-2020-14316Jul 29, 2020
    affected < 0.30.0fixed 0.30.0

    A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can r