CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-53355
7.50.04%

When AI Take the Wheel: Command Injection in Kubernetes MCP Server

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·5 min read·11 visits

PoC Available

Executive Summary (TL;DR)

The mcp-server-kubernetes package trusted user input blindly, passing it directly into `child_process.execSync`. This allowed attackers to inject shell metacharacters through parameters like 'namespace', turning a helpful Kubernetes management tool into a remote shell for the host machine. Fixed in version 2.5.0.

A critical Remote Code Execution (RCE) vulnerability in the mcp-server-kubernetes implementation allows attackers to execute arbitrary shell commands via malicious Model Context Protocol (MCP) tool parameters. By tricking an LLM into processing a crafted prompt, an attacker can pivot from natural language to root access.

Official Patches

Flux159 (GitHub)Commit ab165f5 fixing the vulnerability

Fix Analysis (1)

Technical Appendix

CVSS Score
7.5/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.04%
Top 100% most exploited

Affected Systems

mcp-server-kubernetes < 2.5.0AI Agents using the Kubernetes MCP toolDeveloper workstations with mcp-server-kubernetes installed

Affected Versions Detail

Product
Affected Versions
Fixed Version
mcp-server-kubernetes
Flux159
< 2.5.02.5.0
AttributeDetail
CWE IDCWE-78 (OS Command Injection)
CVSS Score7.5 (High)
Attack VectorNetwork (via LLM Prompt Injection)
PlatformNode.js / Kubernetes
Vulnerable Functionchild_process.execSync

MITRE ATT&CK Mapping

T1059Command and Scripting Interpreter
Execution
T1204User Execution
Execution
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Known Exploits & Detection

GitHub AdvisoryAdvisory detailing the command injection vector in namespace parameters

Vulnerability Timeline

Vulnerability identified by Marco Dell'Alibera
2025-02-21
Fix commit pushed to GitHub
2025-02-21
CVE Published
2025-02-25

References & Sources

  • [1]GitHub Security Advisory
  • [2]NVD Detail
  • [3]Node.js Documentation: execFileSync
Related Vulnerabilities
GHSA-3q26-f695-pp76GHSA-rwc2-f344-q6w6GHSA-vf9j-h32g-2764

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.