A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, potentially disclosing sensitive information or performing actions they are not permitted to do. Additionally, legitimate users may be denied access to resources.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, potentially disclosing sensitive information or performing actions they are not permitted to do. Additionally, legitimate users may be denied access to resources. | |
| Title | Kubevirt: kubevirt: unauthorized subresource access due to improper rbac evaluation | |
| First Time appeared |
Redhat
Redhat container Native Virtualization |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:/a:redhat:container_native_virtualization:4 | |
| Vendors & Products |
Redhat
Redhat container Native Virtualization |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-15T18:40:31.052Z
Reserved: 2026-04-15T18:03:12.839Z
Link: CVE-2026-6383
Updated: 2026-04-15T18:40:25.744Z
Status : Received
Published: 2026-04-15T19:16:38.520
Modified: 2026-04-15T19:16:38.520
Link: CVE-2026-6383
No data.
OpenCVE Enrichment
No data.