Dynamic Resource Allocation validation bypass in the NodeRestriction admission controller of Kubernetes. When the DynamicResourceAllocation feature gate is enabled, a flaw in the pod creation logic allows compromised nodes to bypass authorization checks and create mirror pods with access to unauthorized resources. The vulnerability arises from missing validation during pod creation, which can potentially lead to privilege escalation. Kubelet’s built-in checks typically prevent these pods from starting, limiting practical impact, though the logic gap still poses a security risk.