Kubevirt.Io Kubevirt vulnerabilities
14 known vulnerabilities affecting kubevirt.io/kubevirt.
Total CVEs
14
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM11
Vulnerabilities
Page 1 of 1
CVE-2025-14525MEDIUM≥ 0, ≤ 1.7.02026-01-26
CVE-2025-14525 [MEDIUM] CWE-770 KubeVirt Guest Agent DoS via Excessive Network Interface Reports
KubeVirt Guest Agent DoS via Excessive Network Interface Reports
A flaw was found in KubeVirt. A user within a virtual machine (VM), if the guest agent is active, can exploit this by causing the agent to report an excessive number of network interfaces. This action can overwhelm the system's ability to store VM configuration updates, effectively blocking changes to the Virtual Machine Instance (VMI)
ghsaosv
CVE-2025-64324HIGH≥ 0, < 1.6.1≥ 1.7.0-alpha.0, < 1.7.0-rc.02025-11-07
CVE-2025-64324 [HIGH] CWE-123 KubeVirt Vulnerable to Arbitrary Host File Read and Write
KubeVirt Vulnerable to Arbitrary Host File Read and Write
### Summary
The `hostDisk` feature in KubeVirt allows mounting a host file or directory owned by the user with UID 107 into a VM. However, the implementation of this feature and more specifically the `DiskOrCreate` option which creates a file if it doesn't exist, has a logic bug that allows an attacker to read and write arbitrary files owned by more p
ghsaosv
CVE-2025-64434MEDIUM≥ 0, < 1.5.3≥ 1.6.0-alpha.0, < 1.6.12025-11-06
CVE-2025-64434 [MEDIUM] CWE-287 KubeVirt's Improper TLS Certificate Management Handling Allows API Identity Spoofing
KubeVirt's Improper TLS Certificate Management Handling Allows API Identity Spoofing
### Summary
Due to improper TLS certificate management, a compromised `virt-handler` could impersonate `virt-api` by using its own TLS credentials, allowing it to initiate privileged operations against another `virt-handler`.
### Details
_Give all details on the vulnerability. Pointing to the in
ghsaosv
CVE-2025-64432MEDIUM≥ 0, < 1.5.3≥ 1.6.0-alpha.0, < 1.6.1+1 more2025-11-06
CVE-2025-64432 [MEDIUM] CWE-287 KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer
KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer
### Summary
_Short summary of the problem. Make the impact and severity as clear as possible.
A flawed implementation of the Kubernetes aggregation layer's authentication flow could enable bypassing RBAC controls.
### Details
_Give all details on the vulnerability. Pointing to the incriminated source code is
ghsaosv
CVE-2025-64437MEDIUM≥ 0, < 1.5.3≥ 1.6.0-alpha.0, < 1.6.12025-11-06
CVE-2025-64437 [MEDIUM] CWE-59 KubeVirt Isolation Detection Flaw Allows Arbitrary File Permission Changes
KubeVirt Isolation Detection Flaw Allows Arbitrary File Permission Changes
### Summary
_Short summary of the problem. Make the impact and severity as clear as possible.
It is possible to trick the `virt-handler` component into changing the ownership of arbitrary files on the host node to the unprivileged user with UID `107` due to mishandling of symlinks when determining the root mount of
ghsaosv
CVE-2025-64435MEDIUM≥ 0, < 1.7.0-beta.02025-11-06
CVE-2025-64435 [MEDIUM] CWE-703 KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation
KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation
### Summary
_Short summary of the problem. Make the impact and severity as clear as possible.
A logic flaw in the `virt-controller` allows an attacker to disrupt the control over a running VMI by creating a pod with the same labels as the legitimate `virt-launcher` pod associated with the VMI. This can mislead the `virt-controller` into assoc
ghsaosv
CVE-2025-64433MEDIUM≥ 0, < 1.5.3≥ 1.6.0-alpha.0, < 1.6.12025-11-06
CVE-2025-64433 [MEDIUM] CWE-22 KubeVirt Arbitrary Container File Read
KubeVirt Arbitrary Container File Read
### Summary
_Short summary of the problem. Make the impact and severity as clear as possible.
Mounting a user-controlled PVC disk within a VM allows an attacker to read any file present in the `virt-launcher` pod. This is due to erroneous handling of symlinks defined within a PVC.
### Details
_Give all details on the vulnerability. Pointing to the incriminated source code is very helpf
ghsaosv
CVE-2025-64436MEDIUM≥ 0, < 1.7.02025-11-06
CVE-2025-64436 [MEDIUM] CWE-269 KubeVirt Excessive Role Permissions Could Enable Unauthorized VMI Migrations Between Nodes
KubeVirt Excessive Role Permissions Could Enable Unauthorized VMI Migrations Between Nodes
### Summary
The permissions granted to the `virt-handler` service account, such as the ability to update VMI and patch nodes, could be abused to force a VMI migration to an attacker-controlled node.
### Details
Following the [GitHub security advisory published on March 23 2023](htt
ghsaosv
CVE-2024-33394MEDIUM≥ 0, ≤ 1.2.02024-05-02
CVE-2024-33394 [MEDIUM] CWE-94 kubevirt allows a local attacker to execute arbitrary code via a crafted command
kubevirt allows a local attacker to execute arbitrary code via a crafted command
An issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component.
ghsaosv
CVE-2020-14316CRITICAL≥ 0, < 0.30.02024-04-24
CVE-2020-14316 [CRITICAL] CWE-269 Privilege Escalation in kubevirt
Privilege Escalation in kubevirt
A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data c
ghsaosv
CVE-2024-31420MEDIUM≥ 0, ≤ 1.2.02024-04-03
CVE-2024-31420 [MEDIUM] CWE-476 KubeVirt NULL pointer dereference flaw
KubeVirt NULL pointer dereference flaw
A NULL pointer dereference flaw was found in KubeVirt. This flaw allows an attacker who has access to a virtual machine guest on a node with DownwardMetrics enabled to cause a denial of service by issuing a high number of calls to vm-dump-metrics --virtio and then deleting the virtual machine.
ghsaosv
CVE-2023-26484HIGH≥ 0, ≤ 0.59.02023-03-16
CVE-2023-26484 [HIGH] CWE-863 On a compromised node, the virt-handler service account can be used to modify all node specs
On a compromised node, the virt-handler service account can be used to modify all node specs
### Impact
If a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs.
This can be misused to lure-in system-level-privileged components (which can for instanc
ghsaosv
CVE-2022-1798MEDIUM≥ 0.20.0, < 0.55.12022-08-18
CVE-2022-1798 [MEDIUM] CWE-22 Duplicate Advisory: KubeVirt arbitrary host file read from the VM
Duplicate Advisory: KubeVirt arbitrary host file read from the VM
## Duplicate Advisory
This advisory is a duplicate of [GHSA-qv98-3369-g364](https://github.com/advisories/GHSA-qv98-3369-g364). This link is maintained to preserve external references.
## Original Description
**Summary**
As part of a Kubevirt audit performed by NCC group, a finding dealing with systemic lack of path sanitization whic
ghsa
CVE-2020-1701MEDIUM≥ 0, < 0.26.02021-06-01
CVE-2020-1701 [MEDIUM] CWE-732 Permissions bypass in KubeVirt
Permissions bypass in KubeVirt
A flaw was found in the KubeVirt main virt-handler versions before 0.26.0 regarding the access permissions of virt-handler. An attacker with access to create VMs could attach any secret within their namespace, allowing them to read the contents of that secret.
ghsaosv