{"uuid": "3937f471-3b70-4cbf-92b8-91c680677712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46342", "type": "seen", "source": "https://t.me/cvedetector/24108", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46342 - Kyverno Namespace Selector Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46342 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.13.5 and 1.14.0, it may happen that policy rules using namespace selector(s) in their match statements are mistakenly not applied during admission review request processing due to a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go`. As a consequence, security-critical mutations and validations are bypassed, potentially allowing attackers with K8s API access to perform malicious operations. This issue has been patched in versions 1.13.5 and 1.14.0. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:07.000000Z"}