Overview

FieldValue
ID1027
NameManage ClusterRoles (create, update, patch, delete)
Risk CategoryElevation of Privilege
Risk LevelCritical
Role TypeClusterRole
API Groupsrbac.authorization.k8s.io
Resourcesclusterroles
Verbscreate, update, patch, delete
TagsClusterAdminAccess PrivilegeEscalation RBACManipulation

Description

Allows creating, modifying, or deleting ClusterRoles. This grants the ability to define or alter cluster-wide permissions, enabling an attacker to grant themselves or others arbitrary privileges, including full cluster admin access, leading to complete cluster compromise.