In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloud-ark
Cloud-ark kubeplus |
|
| Vendors & Products |
Cloud-ark
Cloud-ark kubeplus |
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SSRF and HTTP Header Injection in KubePlus 4.1.4 |
Mon, 30 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 CWE-918 |
|
| Metrics |
cvssV3_1
|
Mon, 30 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-03-30T00:00:00.000Z
Updated: 2026-03-30T18:42:18.548Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29954
Updated: 2026-03-30T18:39:20.851Z
Status : Awaiting Analysis
Published: 2026-03-30T17:16:15.867
Modified: 2026-04-01T14:24:21.833
Link: CVE-2026-29954
No data.