Shell Command Injection in KubeAI Operator for Kubernetes
CVE-2026-34940
8.7NONE
Key Information:
- Vendor
Kubeai-project
- Status
- Vendor
- CVE Published:
- 6 April 2026
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2026-34940?
The KubeAI operator for Kubernetes exposes a critical security vulnerability due to improper sanitization of model URL components within the ollamaStartupProbeScript() function. Prior to version 0.23.2, this function constructs a shell command using unsanitized inputs, allowing an attacker with permission to create or modify Model custom resources to inject arbitrary shell commands. These commands are executed by the Kubernetes startup probe, posing significant security risks as they can run directly within the model server pods.
Affected Version(s)
kubeai < 0.23.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
