mcp-kubernetes-server has an OS Command Injection vulnerability
Critical severity
GitHub Reviewed
Published
Sep 15, 2025
to the GitHub Advisory Database
•
Updated Sep 25, 2025
Description
Published by the National Vulnerability Database
Sep 15, 2025
Published to the GitHub Advisory Database
Sep 15, 2025
Reviewed
Sep 15, 2025
Last updated
Sep 25, 2025
feiskyer/mcp-kubernetes-server
through 0.1.11 allows OS command injection via the/mcp/kubectl
endpoint. The handler constructs a shell command with user-supplied arguments and executes it withsubprocess
usingshell=True
, enabling injection through shell metacharacters (e.g.,;
,&&
,$()
), even when the server is running in read-only mode.A remote, unauthenticated attacker can execute arbitrary OS commands on the host, resulting in full compromise of confidentiality, integrity, and availability.
This issue is distinct from
mcp-server-kubernetes
and from CVE-2025-53355.References