CVE-2026-26056
Plain English Summary
AI-powered analysis for quick understanding
An attacker can execute malicious code on the Yoke system, potentially gaining control over Kubernetes resources or escalating their privileges to the highest level. This vulnerability requires the attacker to have permissions to create or update resources in the system.
Technical Description
Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. It allows users with CR create/update permissions to execute arbitrary WASM code in the ATC controller context by injecting a malicious URL through the overrides.yoke.cd/flight annotation. The ATC controller downloads and executes the WASM module without proper URL validation, enabling attackers to create arbitrary Kubernetes resources or potentially escalate privileges to cluster-admin level.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 12, 2026
8 days ago
Last Modified
Feb 13, 2026
8 days ago