Vulnerability Description
In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cloudark | Kubeplus | 4.1.4 |
Related Weaknesses (CWE)
References
- https://gist.github.com/b0b0haha/33baea60fd2a847f11f1fb02e43c64c0ExploitMitigationThird Party Advisory
- https://github.com/b0b0haha/CVE-2026-29954/blob/main/README.mdExploitMitigationThird Party Advisory
FAQ
What is CVE-2026-29954?
CVE-2026-29954 is a vulnerability with a CVSS score of 7.6 (HIGH). In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded...
How severe is CVE-2026-29954?
CVE-2026-29954 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29954?
Check the references section above for vendor advisories and patch information. Affected products include: Cloudark Kubeplus.