Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4hqq-7q79-932p

Опубликовано: 15 сент. 2025
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

mcp-kubernetes-server has an OS Command Injection vulnerability

feiskyer/mcp-kubernetes-server through 0.1.11 allows OS command injection via the /mcp/kubectl endpoint. The handler constructs a shell command with user-supplied arguments and executes it with subprocess using shell=True, enabling injection through shell metacharacters (e.g., ;, &&, $()), even when the server is running in read-only mode.

A remote, unauthenticated attacker can execute arbitrary OS commands on the host, resulting in full compromise of confidentiality, integrity, and availability.

This issue is distinct from mcp-server-kubernetes and from CVE-2025-53355.

Пакеты

Наименование

mcp-kubernetes-server

pip
Затронутые версииВерсия исправления

<= 0.1.11

Отсутствует

EPSS

Процентиль: 18%
0.00058
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 3.7
nvd
5 месяцев назад

feiskyer mcp-kubernetes-server through 0.1.11 allows OS command injection, even in read-only mode, via /mcp/kubectl because shell=True is used. NOTE: this is unrelated to mcp-server-kubernetes and CVE-2025-53355.

EPSS

Процентиль: 18%
0.00058
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-78