CVE-2025-55205

9.0 CRITICAL

📋 TL;DR

A namespace label injection vulnerability in Capsule v0.10.3 and earlier allows authenticated tenant users to inject arbitrary labels into system namespaces (kube-system, default, capsule-system). This bypasses multi-tenant isolation, potentially enabling cross-tenant resource access and privilege escalation. All Kubernetes clusters using vulnerable Capsule versions are affected.

💻 Affected Systems

Products:
  • Capsule
Versions: v0.10.3 and earlier
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Kubernetes clusters using Capsule for multi-tenancy. Requires authenticated tenant user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Tenant users gain administrative access to system namespaces, compromise cluster-wide resources, and access other tenants' data, leading to complete cluster compromise.

🟠

Likely Case

Tenants bypass isolation boundaries to access other tenants' resources, violating data separation and potentially exfiltrating sensitive information.

🟢

If Mitigated

With proper network policies and RBAC restrictions, impact may be limited to specific namespaces, but isolation guarantees are still violated.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated tenant access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.10.4

Vendor Advisory: https://github.com/projectcapsule/capsule/security/advisories/GHSA-fcpm-6mxq-m5vv

Restart Required: Yes

Instructions:

1. Backup your Capsule configuration and tenant resources
2. Update Capsule to v0.10.4 using your deployment method (Helm, kubectl apply, etc.)
3. Restart all Capsule controller pods
4. Verify the new version is running correctly

🔧 Temporary Workarounds

Restrict Label Modification

linux

Implement Kubernetes RBAC policies to restrict tenant users from modifying namespace labels, especially in system namespaces.

kubectl apply -f restrictive-rbac.yaml

🧯 If You Can't Patch

  • Implement strict network policies to isolate tenant namespaces from system namespaces
  • Enhance monitoring and alerting for namespace label modifications, especially in kube-system, default, and capsule-system namespaces

🔍 How to Verify

Check if Vulnerable:

Check Capsule version: kubectl get pods -n capsule-system -l app.kubernetes.io/name=capsule -o jsonpath='{.items[0].spec.containers[0].image}'

Check Version:

kubectl get pods -n capsule-system -l app.kubernetes.io/name=capsule -o jsonpath='{.items[0].spec.containers[0].image}' | grep -o 'v[0-9.]*'

Verify Fix Applied:

Verify Capsule version is v0.10.4 or later and test that tenant users cannot modify labels in system namespaces.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized label modifications in kube-system, default, or capsule-system namespaces
  • Tenant users accessing resources outside their assigned namespaces

Network Indicators:

  • Unexpected network traffic between tenant namespaces and system namespaces

SIEM Query:

kubernetes.namespace IN ('kube-system', 'default', 'capsule-system') AND kubernetes.event_type = 'MODIFIED' AND kubernetes.resource_type = 'namespace' AND kubernetes.operation = 'UPDATE'

🔗 References

📤 Share & Export