Shell Command Injection in KubeAI Operator for Kubernetes
CVE-2026-34940

8.7NONE

Key Information:

Status
Vendor
CVE Published:
6 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-34940?

The KubeAI operator for Kubernetes exposes a critical security vulnerability due to improper sanitization of model URL components within the ollamaStartupProbeScript() function. Prior to version 0.23.2, this function constructs a shell command using unsanitized inputs, allowing an attacker with permission to create or modify Model custom resources to inject arbitrary shell commands. These commands are executed by the Kubernetes startup probe, posing significant security risks as they can run directly within the model server pods.

Affected Version(s)

kubeai < 0.23.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
Severity:
NONE
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.