Security policies like allowed-gadgets
, disallow-pulling
, verify-image
can be bypassed by a malicious client.
Users running ig
in daemon mode or IG on Kubernetes that rely on any of the features mentioned above are vulnerable to this issue. In order to exploit this, the client needs access to the server, like the correct TLS certificates on the ig daemon
case or access to the cluster in the Kubernetes case.
The issue has been fixed in v0.40.0
There is not known workaround to fix it.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-285" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-05-06T00:42:04Z" }