{"uuid": "979b5c21-73a7-494a-b94d-adfa0a477afa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29778", "type": "seen", "source": "https://t.me/cvedetector/20989", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29778 - Kyverno Keyless Certificate Verification Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-29778 \nPublished : March 24, 2025, 5:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to version 1.14.0-alpha.1, Kyverno ignores subjectRegExp and IssuerRegExp while verifying artifact's sign with keyless mode. It allows the attacker to deploy kubernetes resources with the artifacts that were signed by unexpected certificate. Deploying these unauthorized kubernetes resources can lead to full compromise of kubernetes cluster. Version 1.14.0-alpha.1 contains a patch for the issue. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T20:54:53.000000Z"}