<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Networkpolicy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/networkpolicy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/networkpolicy/feed.xml" rel="self" type="application/rss+xml"/><item><title>Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openshift-ai-vuln/</link><pubDate>Fri, 27 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openshift-ai-vuln/</guid><description>CVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.</description><content:encoded>&lt;p>A vulnerability, CVE-2025-12805, has been identified in Red Hat OpenShift AI (RHOAI) llama-stack-operator. The vulnerability stems from the lack of NetworkPolicy restrictions on the llama-stack service endpoint. This allows a user within one namespace to bypass intended isolation and directly access Llama Stack services deployed in other namespaces. The vulnerability was published on March 26, 2026. Successful exploitation could lead to unauthorized data access and manipulation, impacting the…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openshift</category><category>kubernetes</category><category>networkpolicy</category><category>unauthorized-access</category></item></channel></rss>