Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-6383— Kubevirt: kubevirt: unauthorized subresource access due to improper rbac evaluation

CVSS 5.4 · Medium EPSS 0.03% · P10
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-6383

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Kubevirt: kubevirt: unauthorized subresource access due to improper rbac evaluation
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, potentially disclosing sensitive information or performing actions they are not permitted to do. Additionally, legitimate users may be denied access to resources.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不正确
Source: NVD (National Vulnerability Database)
Vulnerability Title
Kubevirt 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Kubevirt是KubeVirt开源的一款虚拟机管理器。 KubeVirt存在安全漏洞,该漏洞源于基于角色的访问控制评估逻辑不当截断子资源名称,可能导致未经授权的访问或拒绝合法用户访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatRed Hat OpenShift Virtualization 4-cpe:/a:redhat:container_native_virtualization:4

II. Public POCs for CVE-2026-6383

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-6383

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2026-04-15 · 10 CVEs total

CVE-2026-63889.1 CRITICALArgocd-image-updater: argocd image updater: cross-namespace privilege escalation via insuf
CVE-2026-63847.3 HIGHGimp: gimp: arbitrary code execution or denial of service via buffer overflow in gif image
CVE-2026-63856.5 MEDIUMFfmpeg: ffmpeg: denial of service and potential arbitrary code execution via signed intege
CVE-2026-409196.1 MEDIUMGimp: gimp: denial of service via specially crafted seattle filmworks file
CVE-2026-409185.5 MEDIUMGimp: gimp: denial of service via crafted pvr image file
CVE-2026-409155.5 MEDIUMGimp: gimp: heap buffer overflow due to integer overflow in fits image loader
CVE-2026-62455.5 MEDIUMSssd: out-of-bounds read in the sssd
CVE-2026-409175.0 MEDIUMGimp: gimp: application crashes or information disclosure via crafted icns image files
CVE-2026-409165.0 MEDIUMGimp: gimp: denial of service due to stack buffer overflow in tim image loader

IV. Related Vulnerabilities

V. Comments for CVE-2026-6383

No comments yet


Leave a comment