Vulnerability Description
KubeAI is an AI inference operator for kubernetes. Prior to 0.23.2, the ollamaStartupProbeScript() function in internal/modelcontroller/engine_ollama.go constructs a shell command string using fmt.Sprintf with unsanitized model URL components (ref, modelParam). This shell command is executed via bash -c as a Kubernetes startup probe. An attacker who can create or update Model custom resources can inject arbitrary shell commands that execute inside model server pods. This vulnerability is fixed in 0.23.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kubeai | Kubeai | < 0.23.2 |
Related Weaknesses (CWE)
References
- https://github.com/kubeai-project/kubeai/security/advisories/GHSA-324q-cwx9-7crrExploitMitigationVendor Advisory
- https://github.com/kubeai-project/kubeai/security/advisories/GHSA-324q-cwx9-7crrExploitMitigationVendor Advisory
FAQ
What is CVE-2026-34940?
CVE-2026-34940 is a vulnerability with a CVSS score of 8.7 (HIGH). KubeAI is an AI inference operator for kubernetes. Prior to 0.23.2, the ollamaStartupProbeScript() function in internal/modelcontroller/engine_ollama.go constructs a shell command string using fmt.Spr...
How severe is CVE-2026-34940?
CVE-2026-34940 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34940?
Check the references section above for vendor advisories and patch information. Affected products include: Kubeai Kubeai.