Kubernetes access privilege escalation is one of the most dangerous and overlooked threats in containerized environments. It happens when a low-privilege account gains higher permissions than intended. This can happen through excessive role assignments, namespace-wide privileges, service account token exposure, or improperly scoped bindings. Once escalated, an attacker can deploy workloads, exfiltrate secrets, or disrupt cluster operations.
The Kubernetes RBAC system is powerful, but it is also easy to misuse. Overprovisioned ClusterRoles, wildcard verbs, and blanket access to sensitive API groups allow privilege escalation pathways. Service accounts with edit or admin roles in sensitive namespaces often lead directly to cluster compromise. Nodes, kubelets, and admission controllers can also be targeted if access is broadened beyond what is required.
Common escalation techniques include: