CVE-2025-4563Improper Input Validation in Kubernetes

Severity
2.7LOWNVD
EPSS
0.0%
top 89.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 23
Latest updateJul 28

Description

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:LExploitability: 1.2 | Impact: 1.4

Affected Packages3 packages

Gok8s.io/kubernetes1.32.01.32.6+1
Debiankubernetes/kubernetes< 1.20.5+really1.20.2-1+3
CVEListV5kubernetes/kubernetesv1.32.0 - v1.32.5, v1.33.0 - v1.33.1+1

🔴Vulnerability Details

5
OSV
Kubernetes allows nodes to bypass dynamic resource allocation authorization checks in k8s.io/kubernetes2025-07-28
OSV
CVE-2025-4563: A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks2025-06-23
OSV
kubernetes allows nodes to bypass dynamic resource allocation authorization checks2025-06-23
CVEList
Nodes can bypass dynamic resource allocation authorization checks2025-06-23
GHSA
kubernetes allows nodes to bypass dynamic resource allocation authorization checks2025-06-23

📋Vendor Advisories

3
Red Hat
kube-apiserver: NodeRestriction Admission Controller Dynamic Resource Allocation Bypass2025-06-19
Microsoft
Nodes can bypass dynamic resource allocation authorization checks2025-06-10
Debian
CVE-2025-4563: kubernetes - A vulnerability exists in the NodeRestriction admission controller where nodes c...2025
CVE-2025-4563 — Improper Input Validation in Kubernetes | cvebase