<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Kubernetes Vulnerability Announcements - CVE Feed</title>
    <link>https://deploy-preview-45268--kubernetes-io-main-staging.netlify.app/docs/reference/issues-security/official-cve-feed/</link>
    <description>Auto-refreshing official CVE feed for Kubernetes repository</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-US</language>
	<copyright>The Kubernetes Authors</copyright>
    <lastBuildDate>Fri, 13 Feb 2026 13:01:17 +0000</lastBuildDate>
    <atom:link href="https://deploy-preview-45268--kubernetes-io-main-staging.netlify.app/docs/reference/issues-security/official-cve-feed/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2025-15566</title>
      <link>https://github.com/kubernetes/kubernetes/issues/136789</link>
      <pubDate>Fri, 06 Feb 2026 02:54:24 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-15566</guid>
      <description>ingress-nginx auth-proxy-set-headers nginx configuration injection</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2026-24514</title>
      <link>https://github.com/kubernetes/kubernetes/issues/136680</link>
      <pubDate>Mon, 02 Feb 2026 03:06:14 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2026-24514</guid>
      <description>ingress-nginx Admission Controller denial of service</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2026-24513</title>
      <link>https://github.com/kubernetes/kubernetes/issues/136679</link>
      <pubDate>Mon, 02 Feb 2026 03:06:04 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2026-24513</guid>
      <description>ingress-nginx auth-url protection bypass</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2026-24512</title>
      <link>https://github.com/kubernetes/kubernetes/issues/136678</link>
      <pubDate>Mon, 02 Feb 2026 03:05:54 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2026-24512</guid>
      <description>ingress-nginx rules.http.paths.path nginx configuration injection</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2026-1580</title>
      <link>https://github.com/kubernetes/kubernetes/issues/136677</link>
      <pubDate>Mon, 02 Feb 2026 03:05:43 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2026-1580</guid>
      <description>ingress-nginx auth-method nginx configuration injection</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-14269</title>
      <link>https://github.com/kubernetes/kubernetes/issues/135798</link>
      <pubDate>Wed, 17 Dec 2025 19:23:10 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-14269</guid>
      <description>Credential caching in Headlamp with Helm enabled</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-13281</title>
      <link>https://github.com/kubernetes/kubernetes/issues/135525</link>
      <pubDate>Sun, 30 Nov 2025 23:08:37 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-13281</guid>
      <description>Portworx Half-Blind SSRF in kube-controller-manager</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-9708</title>
      <link>https://github.com/kubernetes/kubernetes/issues/134063</link>
      <pubDate>Mon, 15 Sep 2025 04:59:12 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-9708</guid>
      <description>Kubernetes C# Client: improper certificate validation in custom CA mode may lead to man-in-the-middle attacks</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-7445</title>
      <link>https://github.com/kubernetes/kubernetes/issues/133897</link>
      <pubDate>Thu, 04 Sep 2025 21:40:42 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-7445</guid>
      <description>secrets-store-sync-controller discloses service account tokens in logs</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-5187</title>
      <link>https://github.com/kubernetes/kubernetes/issues/133471</link>
      <pubDate>Mon, 11 Aug 2025 16:29:36 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-5187</guid>
      <description>Nodes can delete themselves by adding an OwnerReference</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-7342</title>
      <link>https://github.com/kubernetes/kubernetes/issues/133115</link>
      <pubDate>Mon, 21 Jul 2025 23:22:19 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-7342</guid>
      <description>VM images built with Kubernetes Image Builder Nutanix or OVA providers use default credentials for Windows images if user did not override</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-4563</title>
      <link>https://github.com/kubernetes/kubernetes/issues/132151</link>
      <pubDate>Fri, 06 Jun 2025 15:48:26 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-4563</guid>
      <description>Nodes can bypass dynamic resource allocation authorization checks</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-1974</title>
      <link>https://github.com/kubernetes/kubernetes/issues/131009</link>
      <pubDate>Sun, 23 Mar 2025 17:38:57 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-1974</guid>
      <description>ingress-nginx admission controller RCE escalation</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-1098</title>
      <link>https://github.com/kubernetes/kubernetes/issues/131008</link>
      <pubDate>Sun, 23 Mar 2025 17:38:53 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-1098</guid>
      <description>ingress-nginx controller configuration injection via unsanitized mirror annotations</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-1097</title>
      <link>https://github.com/kubernetes/kubernetes/issues/131007</link>
      <pubDate>Sun, 23 Mar 2025 17:38:49 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-1097</guid>
      <description>ingress-nginx controller configuration injection via unsanitized auth-tls-match-cn annotation</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-24514</title>
      <link>https://github.com/kubernetes/kubernetes/issues/131006</link>
      <pubDate>Sun, 23 Mar 2025 17:38:44 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-24514</guid>
      <description>ingress-nginx controller configuration injection via unsanitized auth-url annotation</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-24513</title>
      <link>https://github.com/kubernetes/kubernetes/issues/131005</link>
      <pubDate>Sun, 23 Mar 2025 17:38:28 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-24513</guid>
      <description>ingress-nginx controller auth secret file path traversal vulnerability</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-1767</title>
      <link>https://github.com/kubernetes/kubernetes/issues/130786</link>
      <pubDate>Thu, 13 Mar 2025 16:08:20 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-1767</guid>
      <description>GitRepo Volume Inadvertent Local Repository Access</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2025-0426</title>
      <link>https://github.com/kubernetes/kubernetes/issues/130016</link>
      <pubDate>Thu, 06 Feb 2025 20:03:44 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2025-0426</guid>
      <description>Node Denial of Service via kubelet Checkpoint API</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-9042</title>
      <link>https://github.com/kubernetes/kubernetes/issues/129654</link>
      <pubDate>Wed, 15 Jan 2025 22:28:29 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-9042</guid>
      <description>Command Injection affecting Windows nodes via nodes/*/logs/query API</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-10220</title>
      <link>https://github.com/kubernetes/kubernetes/issues/128885</link>
      <pubDate>Wed, 20 Nov 2024 15:30:44 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-10220</guid>
      <description>Arbitrary command execution through gitRepo volume</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-9594</title>
      <link>https://github.com/kubernetes/kubernetes/issues/128007</link>
      <pubDate>Fri, 11 Oct 2024 18:04:50 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-9594</guid>
      <description>VM images built with Image Builder with some providers use default credentials during builds</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-9486</title>
      <link>https://github.com/kubernetes/kubernetes/issues/128006</link>
      <pubDate>Fri, 11 Oct 2024 18:04:31 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-9486</guid>
      <description>VM images built with Image Builder and Proxmox provider use default credentials</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-7646</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126744</link>
      <pubDate>Fri, 16 Aug 2024 16:10:31 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-7646</guid>
      <description>Ingress-nginx Annotation Validation Bypass</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-7598</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126587</link>
      <pubDate>Wed, 07 Aug 2024 21:30:11 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-7598</guid>
      <description>Network restriction bypass via race condition during namespace termination</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-5321</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126161</link>
      <pubDate>Wed, 17 Jul 2024 13:06:48 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-5321</guid>
      <description>Incorrect permissions on Windows containers logs</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-3744</title>
      <link>https://github.com/kubernetes/kubernetes/issues/124759</link>
      <pubDate>Wed, 08 May 2024 16:02:57 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-3744</guid>
      <description>azure-file-csi-driver discloses service account tokens in logs</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2024-3177</title>
      <link>https://github.com/kubernetes/kubernetes/issues/124336</link>
      <pubDate>Tue, 16 Apr 2024 14:04:09 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2024-3177</guid>
      <description>Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-5528</title>
      <link>https://github.com/kubernetes/kubernetes/issues/121879</link>
      <pubDate>Tue, 14 Nov 2023 15:54:16 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-5528</guid>
      <description>Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-5044</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126817</link>
      <pubDate>Wed, 25 Oct 2023 15:48:28 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-5044</guid>
      <description>Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-5043</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126816</link>
      <pubDate>Wed, 25 Oct 2023 15:48:20 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-5043</guid>
      <description>Ingress nginx annotation injection causes arbitrary command execution</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2022-4886</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126815</link>
      <pubDate>Wed, 25 Oct 2023 15:48:08 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2022-4886</guid>
      <description>ingress-nginx path sanitization can be bypassed</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-3955</title>
      <link>https://github.com/kubernetes/kubernetes/issues/119595</link>
      <pubDate>Wed, 26 Jul 2023 15:30:50 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-3955</guid>
      <description>Insufficient input sanitization on Windows nodes leads to privilege escalation</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-3893</title>
      <link>https://github.com/kubernetes/kubernetes/issues/119594</link>
      <pubDate>Wed, 26 Jul 2023 15:30:26 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-3893</guid>
      <description>Insufficient input sanitization on kubernetes-csi-proxy leads to privilege escalation</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-3676</title>
      <link>https://github.com/kubernetes/kubernetes/issues/119339</link>
      <pubDate>Fri, 14 Jul 2023 18:27:48 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-3676</guid>
      <description>Insufficient input sanitization on Windows nodes leads to privilege escalation</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-2431</title>
      <link>https://github.com/kubernetes/kubernetes/issues/118690</link>
      <pubDate>Thu, 15 Jun 2023 14:42:32 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-2431</guid>
      <description>Bypass of seccomp profile enforcement</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-2728</title>
      <link>https://github.com/kubernetes/kubernetes/issues/118640</link>
      <pubDate>Tue, 13 Jun 2023 14:42:06 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-2728</guid>
      <description>Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-2727</title>
      <link>https://github.com/kubernetes/kubernetes/issues/118640</link>
      <pubDate>Tue, 13 Jun 2023 14:42:06 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-2727</guid>
      <description>Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2023-2878</title>
      <link>https://github.com/kubernetes/kubernetes/issues/118419</link>
      <pubDate>Fri, 02 Jun 2023 19:03:54 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2023-2878</guid>
      <description>secrets-store-csi-driver discloses service account tokens in logs</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2022-3294</title>
      <link>https://github.com/kubernetes/kubernetes/issues/113757</link>
      <pubDate>Tue, 08 Nov 2022 21:33:26 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2022-3294</guid>
      <description>Node address isn&amp;#39;t always verified when proxying</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2022-3162</title>
      <link>https://github.com/kubernetes/kubernetes/issues/113756</link>
      <pubDate>Tue, 08 Nov 2022 21:33:07 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2022-3162</guid>
      <description>Unauthorized read of Custom Resources</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2022-3172</title>
      <link>https://github.com/kubernetes/kubernetes/issues/112513</link>
      <pubDate>Fri, 16 Sep 2022 13:14:50 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2022-3172</guid>
      <description>Aggregated API server can cause clients to be redirected (SSRF)</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25749</title>
      <link>https://github.com/kubernetes/kubernetes/issues/112192</link>
      <pubDate>Thu, 01 Sep 2022 21:02:01 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25749</guid>
      <description>`runAsNonRoot` logic bypass for Windows containers</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25748</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126814</link>
      <pubDate>Fri, 10 Jun 2022 16:01:41 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25748</guid>
      <description>Ingress-nginx `path` sanitization can be bypassed with newline character</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25746</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126813</link>
      <pubDate>Fri, 22 Apr 2022 16:18:27 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25746</guid>
      <description>Ingress-nginx directive injection via annotations</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25745</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126812</link>
      <pubDate>Fri, 22 Apr 2022 16:18:21 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25745</guid>
      <description>Ingress-nginx `path` can be pointed to service account token file</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25742</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126811</link>
      <pubDate>Thu, 21 Oct 2021 16:08:21 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25742</guid>
      <description>Ingress-nginx custom snippets allows retrieval of ingress-nginx serviceaccount token and secrets across all namespaces</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25741</title>
      <link>https://github.com/kubernetes/kubernetes/issues/104980</link>
      <pubDate>Mon, 13 Sep 2021 20:58:56 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25741</guid>
      <description>Symlink Exchange Can Allow Host Filesystem Access</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8561</title>
      <link>https://github.com/kubernetes/kubernetes/issues/104720</link>
      <pubDate>Wed, 01 Sep 2021 20:18:50 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8561</guid>
      <description>Webhook redirect in kube-apiserver</description>
      <category term="open" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25740</title>
      <link>https://github.com/kubernetes/kubernetes/issues/103675</link>
      <pubDate>Wed, 14 Jul 2021 03:30:07 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25740</guid>
      <description>Endpoint &amp;amp; EndpointSlice permissions allow cross-Namespace forwarding</description>
      <category term="unknown" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25737</title>
      <link>https://github.com/kubernetes/kubernetes/issues/102106</link>
      <pubDate>Tue, 18 May 2021 19:14:27 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25737</guid>
      <description>Holes in EndpointSlice Validation Enable Host Network Hijack</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8562</title>
      <link>https://github.com/kubernetes/kubernetes/issues/101493</link>
      <pubDate>Mon, 26 Apr 2021 19:18:04 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8562</guid>
      <description>Bypass of Kubernetes API Server proxy TOCTOU</description>
      <category term="unknown" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-3121</title>
      <link>https://github.com/kubernetes/kubernetes/issues/101435</link>
      <pubDate>Fri, 23 Apr 2021 18:07:32 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-3121</guid>
      <description>Processes may panic upon receipt of malicious protobuf messages</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2021-25735</title>
      <link>https://github.com/kubernetes/kubernetes/issues/100096</link>
      <pubDate>Wed, 10 Mar 2021 18:18:01 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2021-25735</guid>
      <description>Validating Admission Webhook does not observe some previous fields</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8554</title>
      <link>https://github.com/kubernetes/kubernetes/issues/97076</link>
      <pubDate>Fri, 04 Dec 2020 20:02:15 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8554</guid>
      <description>Man in the middle using LoadBalancer or ExternalIPs</description>
      <category term="unknown" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8566</title>
      <link>https://github.com/kubernetes/kubernetes/issues/95624</link>
      <pubDate>Thu, 15 Oct 2020 22:07:53 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8566</guid>
      <description>Ceph RBD adminSecrets exposed in logs when loglevel &amp;gt;= 4</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8565</title>
      <link>https://github.com/kubernetes/kubernetes/issues/95623</link>
      <pubDate>Thu, 15 Oct 2020 22:05:32 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8565</guid>
      <description>Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel &amp;gt;= 9</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8564</title>
      <link>https://github.com/kubernetes/kubernetes/issues/95622</link>
      <pubDate>Thu, 15 Oct 2020 22:03:19 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8564</guid>
      <description>Docker config secrets leaked when file is malformed and log level &amp;gt;= 4</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8563</title>
      <link>https://github.com/kubernetes/kubernetes/issues/95621</link>
      <pubDate>Thu, 15 Oct 2020 22:00:44 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8563</guid>
      <description>Secret leaks in kube-controller-manager when using vSphere provider</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8557</title>
      <link>https://github.com/kubernetes/kubernetes/issues/93032</link>
      <pubDate>Mon, 13 Jul 2020 18:39:08 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8557</guid>
      <description>Node disk DOS by writing to container /etc/hosts</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8559</title>
      <link>https://github.com/kubernetes/kubernetes/issues/92914</link>
      <pubDate>Wed, 08 Jul 2020 17:03:16 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8559</guid>
      <description>Privilege escalation from compromised node to cluster</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8558</title>
      <link>https://github.com/kubernetes/kubernetes/issues/92315</link>
      <pubDate>Fri, 19 Jun 2020 18:38:58 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8558</guid>
      <description>Node setting allows for neighboring hosts to bypass localhost boundary</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8555</title>
      <link>https://github.com/kubernetes/kubernetes/issues/91542</link>
      <pubDate>Thu, 28 May 2020 16:13:34 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8555</guid>
      <description>Half-Blind SSRF in kube-controller-manager</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-10749</title>
      <link>https://github.com/kubernetes/kubernetes/issues/91507</link>
      <pubDate>Wed, 27 May 2020 19:32:29 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-10749</guid>
      <description>IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11254</title>
      <link>https://github.com/kubernetes/kubernetes/issues/89535</link>
      <pubDate>Thu, 26 Mar 2020 18:55:26 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11254</guid>
      <description>kube-apiserver Denial of Service vulnerability from malicious YAML payloads</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8552</title>
      <link>https://github.com/kubernetes/kubernetes/issues/89378</link>
      <pubDate>Mon, 23 Mar 2020 18:35:34 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8552</guid>
      <description>apiserver DoS (oom)</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8551</title>
      <link>https://github.com/kubernetes/kubernetes/issues/89377</link>
      <pubDate>Mon, 23 Mar 2020 18:34:40 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8551</guid>
      <description>Kubelet DoS via API</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2020-8553</title>
      <link>https://github.com/kubernetes/kubernetes/issues/126818</link>
      <pubDate>Wed, 19 Feb 2020 19:00:32 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2020-8553</guid>
      <description>ingress-nginx auth-type basic annotation vulnerability</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11251</title>
      <link>https://github.com/kubernetes/kubernetes/issues/87773</link>
      <pubDate>Mon, 03 Feb 2020 15:12:22 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11251</guid>
      <description>kubectl cp symlink vulnerability</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2018-1002102</title>
      <link>https://github.com/kubernetes/kubernetes/issues/85867</link>
      <pubDate>Tue, 03 Dec 2019 22:58:37 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2018-1002102</guid>
      <description>Unvalidated redirect</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11255</title>
      <link>https://github.com/kubernetes/kubernetes/issues/85233</link>
      <pubDate>Wed, 13 Nov 2019 20:57:31 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11255</guid>
      <description>CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11253</title>
      <link>https://github.com/kubernetes/kubernetes/issues/83253</link>
      <pubDate>Fri, 27 Sep 2019 16:53:31 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11253</guid>
      <description>Kubernetes API Server JSON/YAML parsing vulnerable to resource exhaustion attack</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11250</title>
      <link>https://github.com/kubernetes/kubernetes/issues/81114</link>
      <pubDate>Thu, 08 Aug 2019 02:03:04 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11250</guid>
      <description>Bearer tokens are revealed in logs (audit finding TOB-K8S-001)</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11248</title>
      <link>https://github.com/kubernetes/kubernetes/issues/81023</link>
      <pubDate>Tue, 06 Aug 2019 14:34:33 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11248</guid>
      <description>/debug/pprof exposed on kubelet&amp;#39;s healthz port</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11249</title>
      <link>https://github.com/kubernetes/kubernetes/issues/80984</link>
      <pubDate>Mon, 05 Aug 2019 12:44:23 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11249</guid>
      <description>Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11247</title>
      <link>https://github.com/kubernetes/kubernetes/issues/80983</link>
      <pubDate>Mon, 05 Aug 2019 12:44:08 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11247</guid>
      <description>API server allows access to custom resources via wrong scope</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11245</title>
      <link>https://github.com/kubernetes/kubernetes/issues/78308</link>
      <pubDate>Fri, 24 May 2019 16:14:49 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11245</guid>
      <description>container uid changes to root after first restart or if image is already pulled to the node</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11243</title>
      <link>https://github.com/kubernetes/kubernetes/issues/76797</link>
      <pubDate>Thu, 18 Apr 2019 21:31:53 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11243</guid>
      <description>rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-11244</title>
      <link>https://github.com/kubernetes/kubernetes/issues/76676</link>
      <pubDate>Tue, 16 Apr 2019 20:14:25 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-11244</guid>
      <description>`kubectl --http-cache=&amp;lt;world-accessible dir&amp;gt;` creates world-writeable cached schema files</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2019-1002100</title>
      <link>https://github.com/kubernetes/kubernetes/issues/74534</link>
      <pubDate>Mon, 25 Feb 2019 19:39:09 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2019-1002100</guid>
      <description>json-patch requests can exhaust apiserver resources</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2018-1002105</title>
      <link>https://github.com/kubernetes/kubernetes/issues/71411</link>
      <pubDate>Mon, 26 Nov 2018 11:07:36 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2018-1002105</guid>
      <description>proxy request handling in kube-apiserver can leave vulnerable TCP connections</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2018-1002101</title>
      <link>https://github.com/kubernetes/kubernetes/issues/65750</link>
      <pubDate>Tue, 03 Jul 2018 08:06:15 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2018-1002101</guid>
      <description>smb mount security issue</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2018-1002100</title>
      <link>https://github.com/kubernetes/kubernetes/issues/61297</link>
      <pubDate>Fri, 16 Mar 2018 19:24:46 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2018-1002100</guid>
      <description>Kubectl copy doesn&amp;#39;t check for paths outside of it&amp;#39;s destination directory.</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2017-1002102</title>
      <link>https://github.com/kubernetes/kubernetes/issues/60814</link>
      <pubDate>Mon, 05 Mar 2018 20:55:20 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2017-1002102</guid>
      <description>atomic writer volume handling allows arbitrary file deletion in host filesystem</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2017-1002101</title>
      <link>https://github.com/kubernetes/kubernetes/issues/60813</link>
      <pubDate>Mon, 05 Mar 2018 20:53:58 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2017-1002101</guid>
      <description>subpath volume mount handling allows arbitrary file access in host filesystem</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2017-1002100</title>
      <link>https://github.com/kubernetes/kubernetes/issues/47611</link>
      <pubDate>Thu, 15 Jun 2017 18:59:13 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2017-1002100</guid>
      <description>Azure PV should be Private scope not Container scope</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    <item>
      <title>CVE-2017-1000056</title>
      <link>https://github.com/kubernetes/kubernetes/issues/43459</link>
      <pubDate>Tue, 21 Mar 2017 15:22:29 +0000</pubDate>
      <guid>https://www.cve.org/cverecord?id=CVE-2017-1000056</guid>
      <description>PodSecurityPolicy admission plugin authorizes incorrectly</description>
      <category term="fixed" scheme="https://k8s.io/2024-06-27/cve-item-status" />
    </item>
    </channel>
</rss>