Skip to main content
Version: latest

CVE-2025-29778

CVE Details

Visit the official vulnerability details page for CVE-2025-29778 to learn more.

Initial Publication

07/31/2025

Last Update

10/15/2025

Third Party Dependency

github.com/kyverno/kyverno

NIST CVE Summary

Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to version 1.14.0-alpha.1, Kyverno ignores subjectRegExp and IssuerRegExp while verifying artifact's sign with keyless mode. It allows the attacker to deploy kubernetes resources with the artifacts that were signed by unexpected certificate. Deploying these unauthorized kubernetes resources can lead to full compromise of kubernetes cluster. Version 1.14.0-alpha.1 contains a patch for the issue.

CVE Severity

undefined

Our Official Summary

This vulnerability affects Kyverno’s keyless signature verification flow using Cosign (Fulcio/OIDC). In vulnerable versions, Kyverno fails to enforce the subjectRegExp and issuerRegExp checks when validating artifact signatures, allowing artifacts signed with unapproved certificates to be accepted. This could enable the deployment of unauthorized Kubernetes resources and, depending on their nature, potentially lead to full cluster compromise.

Within the Palette environment, Kyverno is installed on workload clusters only when workspaces are configured to blacklist container images and is used exclusively for image admission. Since this vulnerability applies only to Kyverno deployments using Cosign in keyless mode functionality not utilized in Palette-managed clusters, there is no impact on clusters provisioned by Palette.

As a precautionary measure, Kyverno and its related libraries will be upgraded to the latest available version that includes the fix for this vulnerability.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.7.23✅ No Impact✅ No Impact⚠️ Impacted✅ No Impact
4.6.41⚠️ Impacted✅ No Impact⚠️ Impacted⚠️ Impacted

Revision History

DateRevision
10/15/2025Official summary revised: This vulnerability affects Kyverno’s keyless signature verification flow using Cosign (Fulcio/OIDC). In vulnerable versions, Kyverno fails to enforce the subjectRegExp and issuerRegExp checks when validating artifact signatures, allowing artifacts signed with unapproved certificates to be accepted. This could enable the deployment of unauthorized Kubernetes resources and, depending on their nature, potentially lead to full cluster compromise.Within the Palette environment, Kyverno is installed on workload clusters only when workspaces are configured to blacklist container images and is used exclusively for image admission. Since this vulnerability applies only to Kyverno deployments using Cosign in keyless mode functionality not utilized in Palette-managed clusters, there is no impact on clusters provisioned by Palette.As a precautionary measure, Kyverno and its related libraries will be upgraded to the latest available version that includes the fix for this vulnerability.
10/15/2025Status changed from Open to Ongoing
10/15/2025Official summary added