CVE-2025-29922

9.6 CRITICAL

📋 TL;DR

This vulnerability in kcp allows attackers to create or delete objects in any arbitrary target workspace via the APIExport VirtualWorkspace, bypassing the intended access controls. Attackers can perform these actions even when no APIBinding exists or when permission claims have been explicitly rejected. This affects all kcp deployments prior to version 0.26.3.

💻 Affected Systems

Products:
  • kcp
Versions: All versions prior to 0.26.3
Operating Systems: All platforms running kcp
Default Config Vulnerable: ⚠️ Yes
Notes: All kcp deployments using APIExport VirtualWorkspace feature are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all workspaces, allowing unauthorized creation/deletion of critical resources, potential data destruction, and privilege escalation across the entire kcp deployment.

🟠

Likely Case

Unauthorized modification or deletion of resources in workspaces where the attacker shouldn't have access, potentially disrupting operations or exfiltrating sensitive data.

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent unauthorized API access, though the vulnerability still exists at the application layer.

🌐 Internet-Facing: HIGH - If kcp API endpoints are exposed to the internet, attackers can directly exploit this vulnerability without internal access.
🏢 Internal Only: HIGH - Even internally, any user or service with API access can potentially exploit this to escalate privileges or access unauthorized workspaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires API access but is straightforward once access is obtained. The vulnerability is in the authorization logic, making exploitation simple for authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.26.3 or 0.27.0

Vendor Advisory: https://github.com/kcp-dev/kcp/security/advisories/GHSA-w2rr-38wv-8rrp

Restart Required: Yes

Instructions:

1. Stop kcp services. 2. Backup configuration and data. 3. Upgrade to kcp version 0.26.3 or 0.27.0. 4. Restart kcp services. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict API Access

linux

Limit network access to kcp API endpoints to only trusted sources using firewall rules or network policies.

# Example using iptables: iptables -A INPUT -p tcp --dport <kcp-port> -s <trusted-ip> -j ACCEPT
iptables -A INPUT -p tcp --dport <kcp-port> -j DROP

Disable APIExport VirtualWorkspace

all

If not required, disable the vulnerable APIExport VirtualWorkspace feature entirely.

# Modify kcp configuration to disable virtual workspace features
# Check kcp documentation for specific configuration options

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate kcp API endpoints from untrusted networks
  • Enforce least-privilege access controls and audit all API access logs for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check kcp version: if version is less than 0.26.3, the system is vulnerable.

Check Version:

kcp version | grep -i version

Verify Fix Applied:

After patching, verify version is 0.26.3 or higher and test that APIExport VirtualWorkspace properly enforces APIBinding requirements.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API calls to create/delete objects in workspaces without proper APIBinding
  • API requests to APIExport VirtualWorkspace endpoints from unexpected sources
  • Failed authorization attempts followed by successful object modifications

Network Indicators:

  • Unusual API traffic patterns to kcp endpoints
  • Requests to APIExport VirtualWorkspace from unauthorized IP addresses

SIEM Query:

source="kcp-logs" AND ("APIExport" OR "VirtualWorkspace") AND ("create" OR "delete") AND NOT "APIBinding"

🔗 References

📤 Share & Export