CVE-2025-66404
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-03

Last updated on: 2025-12-16

Assigner: GitHub, Inc.

Description
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-03
Last Modified
2025-12-16
Generated
2026-05-07
AI Q&A
2025-12-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
suyogs mcp-server-kubernetes to 2.9.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the exec_in_pod tool of the MCP Server Kubernetes prior to version 2.9.8. The tool accepts user commands in string format and passes them directly to shell interpretation without validating the input. This allows shell metacharacters to be interpreted, enabling attackers to perform command injection either directly or indirectly, including through AI agents executing commands without explicit user intent.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized command execution on the Kubernetes cluster managed by the MCP Server. This can result in compromise of confidentiality, integrity, and availability of the system, potentially allowing attackers to execute arbitrary commands, disrupt services, or gain elevated privileges.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the MCP Server Kubernetes to version 2.9.8 or later, as this version contains the fix for the vulnerability in the exec_in_pod tool that prevents command injection via shell interpretation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart