Announcing Kyverno 1.18!
Announcing Kyverno Release 1.18!
We’re excited to announce the release of Kyverno 1.18, our first release since graduating within the Cloud Native Computing Foundation.
This release builds on Kyverno’s growing role as a Kubernetes-native policy engine, with major investments in security, CLI capabilities, and policy engine reliability. It also continues our transition toward CEL-based policy types, setting the foundation for the future of policy as code.
TL;DR
Kyverno 1.18 delivers:
-
Stronger security controls for HTTP-based policy execution and multiple CVE mitigations
-
Significant CLI enhancements for testing and applying modern policy types
-
Policy engine improvements for performance, observability, and scalability
-
Enhancements to the policies Helm chart for better customization
There are no breaking changes in this release, but ClusterPolicy deprecation remains on track, and users should begin migrating to the newer policy types.
Security Improvements
Security is a core pillar of Kyverno, and 1.18 introduces important safeguards for policy execution.
Safer HTTP Execution
Kyverno policies can call external services via HTTP CEL libraries. In 1.18, this capability is significantly hardened:
-
Blocklist/allowlist enforcement: by default, unsafe addresses like loopback and metadata services are blocked. Users can configure an allow list and a block list for cluster-scoped and namespaced policies. Additionally, HTTP calls from namespaced policies are default disabled, and need to be explicitly enabled using configuration flags. These changes help prevent SSRF-style abuse. See CVE-2026-4789 for details.
-
Scoped token authorization: Previously, Kyverno HTTP calls included a token which could be used to impersonate Kyverno controllers. Now, HTTP calls include a separate scoped token that ensures that servers cannot misuse the token. See CVE-2026-41323 for details.
These changes reduce the risk of unintended external access while maintaining flexibility for advanced policy use cases.
CLI Expansion and Developer Experience
Kyverno’s CLI continues to evolve as a critical tool for policy development and testing.
Expanded Policy Support
The kyverno apply and kyverno test commands now support:
-
Cleanup policies
-
HTTP and Envoy authorization policies
-
mutateExistingrules inMutatingPolicy -
The
--exceptions-with-policiesflag for improved testing workflows
This significantly improves the ability to test modern policy types locally and in CI pipelines.
Reliability and Usability Improvements
Numerous fixes address:
-
Error handling and reporting
-
CRD compatibility without cluster connections
-
Stability issues such as panics and file handle leaks
The result is a more predictable and developer-friendly experience when working with policies.
Policy Engine Improvements
Kyverno 1.18 includes several enhancements that improve how policies are executed and managed at scale.
Fine-Grained Success Event Filtering
A new successEventActions ConfigMap parameter allows users to control:
-
Which success events are emitted
-
How noisy or quiet policy reporting should be
This is especially valuable in large environments where event volume needs to be tuned.
Performance and Scalability
Key improvements include:
-
Memory-based HPA autoscaling for the admission controller
-
TLS support on the /metrics endpoint
-
Improved concurrency handling and reduced risk of race conditions
These changes make Kyverno more resilient in high-scale production environments.
CEL and Policy Execution Enhancements
-
Addition of a gzip CEL library for more advanced expressions
-
Improved compilation and evaluation of policy variables and conditions
-
Better alignment between policy types and execution engines
Image Verification Improvements
Several targeted improvements land for image verification:
-
For
ClusterPolicies,imageRegistryCredentials.secretsnow accepts anamespace/namenotation, and pod-levelimagePullSecretsare automatically used as registry credentials, useful in multi-tenant environments where each namespace manages its own pull secrets. -
Reliability fixes for
ImageValidatingPolicy, including better handling of signed timestamps and TSA certificate chains, Notary resolver fixes, correctmatchImageReferencesfiltering, and improved autogen support for namespaced policies.
Policies Helm Chart Enhancements
The policies Helm chart continues to evolve with better customization and control.
New capabilities include:
-
Support for excludes in ValidatingPolicies (namespace, subject, resource rules, match conditions)
-
auditAnnotationconfiguration -
Per-policy annotation overrides
These improvements make it easier to tailor policies to specific organizational and operational needs.
Updated Support Policy
As Kyverno continues to grow in adoption, contributions, and overall project scope, we are evolving how we provide release support.
Starting with the 1.18 release, Kyverno will follow a “main + 1” patch support model.
This means:
-
The current release (main) and the immediately previous release will be supported for patches. Patches are limited to critical and high severity CVEs, and other critical fixes. This provides roughly 3 months of community patch support.
-
Older versions will no longer receive regular updates or fixes
Why this change
This adjustment allows the maintainer team to:
-
Efficiently manage the AI driven increase in security issues and PRs
-
Maintain higher standards for security and responsiveness
-
Focus efforts on current and actively used versions
-
Keep the project sustainable and manageable as it scales
What this means for users
We recommend that users:
-
Stay up to date with recent Kyverno releases
-
Plan upgrades in alignment with the 3 month support window, or use a commercial distribution that provides higher SLAs and long term support
-
Reach out to the community if guidance is needed
This change ensures we can continue to deliver a secure, stable, and forward-moving project for everyone.
ClusterPolicy Deprecation Reminder
As a reminder, ClusterPolicy resources are planned for deprecation later this year.
We strongly encourage users to begin migrating to the newer policy types:
- ValidatingPolicy
- MutatingPolicy
- GeneratingPolicy
- ImageValidatingPolicy
- DeletingPolicy
What you should do
-
Start migrating existing policies
-
Test thoroughly using the CLI
-
Report any gaps or issues
Community feedback is essential to ensuring a smooth transition and full feature parity. We ask that you please report issues and help us build full parity in the upcoming months.
Community Updates
Kyverno’s graduation within the CNCF marks a major milestone for the project and its community.
Join the Community
Kyverno community meetings now run at multiple global-friendly times:
-
APAC / EU: Every other Wednesday 9:00 CET / India 13:30h / EU: 09:00h / Singapore: 16:00h / Australia: 18:00h
-
USA/LATAM: Every other Wednesday 16:00 CET / India 20:30h / EU: 16:00h / NYC: 10:00h / SF: 7:00h
You can find all meetings on the CNCF Calendar using the Kyverno filter.
Additionally, we are working to create a space where community members can publish case studies and use cases to our community blog in hopes that this will serve as a space where everyone can learn from each other. Please keep an eye out for the announcements of when this section of the blog will be live and if you would like to submit a use case or case study, please reach out to cortney.nickerson@nirmata.com directly.
Getting Started and Upgrading
Kyverno 1.18 has no breaking changes, making it a safe and straightforward upgrade for most users.
Upgrade
-
Review the release notes
-
Test in staging environments
-
Follow upgrade guidance in the documentation
Install
https://kyverno.io/docs/installation/
Release Notes
https://github.com/kyverno/kyverno/releases
What’s Next
Looking ahead, the Kyverno roadmap focuses on:
-
Continued investment in CEL-based policy types
-
Improved policy authoring experience
-
Scaling policy across multi-cluster environments
-
Expanding into AI governance and policy-driven automation
Conclusion
Kyverno 1.18 is a meaningful step forward following our CNCF graduation.
With stronger security, expanded CLI capabilities, and continued investment in policy engine reliability and Kubernetes-native policy, Kyverno is helping teams move from policy enforcement to policy-driven operations at scale.
As the project continues to grow, we are also evolving how we operate to ensure long-term sustainability. Our move to an N-1 support model reflects a commitment to maintaining high-quality releases while keeping pace with the needs of a rapidly expanding community and ecosystem.
Upgrade to Kyverno 1.18, stay current with supported releases, begin your migration to the new policy types, and help us build the future of policy as code.