Security policies like <code>allowed-gadgets</code>, <code>disallow-pulling</code>, <code>verify-image</code> can be bypassed by a malicious client.
Users running ig in daemon mode or IG on Kubernetes that rely on any of the features mentioned above are vulnerable to this issue. In order to exploit this, the client needs access to the server, like the correct TLS certificates on the ig daemon case or access to the cluster in the Kubernetes case. 
The issue has been fixed in v0.40.0
There is not known workaround to fix it.
{
    "nvd_published_at": null,
    "severity": "MODERATE",
    "github_reviewed_at": "2025-05-06T00:42:04Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-285"
    ]
}