A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, potentially disclosing sensitive information or performing actions they are not permitted to do. Additionally, legitimate users may be denied access to resources.
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat openshift virtualization | go/kubevirt.io/kubevirt: <= 1.8.1 |
Updated severity to CRITICAL, marked as actively exploited, and added CVE-2026-6383 as a new tag.
Initial creation