CVE-2025-29922: Unauthorized Object Manipulation via APIExport in kcp Virtual Workspaces

Critical Authorization Flaw in kcp’s APIExport VirtualWorkspace

On March 20, 2025, a critical vulnerability identified as CVE-2025-29922 was disclosed in kcp, a Kubernetes-like control plane framework developed by kcp-dev. This flaw allows unauthorized users to create or delete objects across arbitrary workspaces via the APIExport VirtualWorkspace.

Understanding the Vulnerability

kcp provides flexible workspace-based API management for workloads beyond standard Kubernetes clusters. A core security mechanism involves workspace owners explicitly granting API access via an APIBinding.

However, due to improper authorization logic (categorized as CWE-285: Improper Authorization), any user with low privileges could exploit the APIExport VirtualWorkspace interface to:

  • Create objects in any target workspace
  • Delete existing resources in unauthorized workspaces

This could occur even when:

  • No APIBinding exists in the target workspace
  • The workspace owner explicitly rejected the permission claim

Effectively, this bypasses the entire access control model meant to protect kcp environments.

CVSS Score and Impact

The vulnerability has been assigned a CVSS v3.1 base score of 9.6 (CRITICAL), using the following vector:

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Key factors contributing to this score include:

  • Attack Vector: Network – can be exploited remotely
  • Attack Complexity: Low – simple to execute
  • Privileges Required: Low – minimal access required
  • Scope: Changed – affects broader system beyond vulnerable component
  • Confidentiality & Integrity Impact: High – unauthorized data manipulation is possible
  • Availability Impact: None – system stability remains intact

Remediation

The issue has been patched in kcp versions 0.26.3 and 0.27.0. All users should:

  • Upgrade to a patched version immediately
  • Review and audit APIExport usage and bindings
  • Validate workspace access configurations

There is currently no evidence of public exploitation, but the impact is severe if left unpatched.

References

Conclusion

CVE-2025-29922 exposes a critical breakdown in authorization controls within kcp. Organizations relying on kcp for API-based service control should prioritize applying updates and verifying their permission models. This vulnerability highlights the importance of robust authorization enforcement in distributed systems.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *