{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/networkpolicy/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["openshift","kubernetes","networkpolicy","unauthorized-access"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA vulnerability, CVE-2025-12805, has been identified in Red Hat OpenShift AI (RHOAI) llama-stack-operator. The vulnerability stems from the lack of NetworkPolicy restrictions on the llama-stack service endpoint. This allows a user within one namespace to bypass intended isolation and directly access Llama Stack services deployed in other namespaces. The vulnerability was published on March 26, 2026. Successful exploitation could lead to unauthorized data access and manipulation, impacting the…\u003c/p\u003e\n","date_modified":"2026-03-27T10:00:00Z","date_published":"2026-03-27T10:00:00Z","id":"/briefs/2026-03-openshift-ai-vuln/","summary":"CVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.","title":"Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)","url":"https://feed.craftedsignal.io/briefs/2026-03-openshift-ai-vuln/"}],"language":"en","title":"CraftedSignal Threat Feed — Networkpolicy","version":"https://jsonfeed.org/version/1.1"}