Graham Helton 1/26/2026

Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission

Read Original

This technical article details a Kubernetes security vulnerability where a service account with nodes/proxy GET permissions can be exploited to execute code on any Pod via the Kubelet API. It covers the exploit mechanism, impact (potential full cluster compromise), lists 69 affected Helm charts (like Prometheus, Datadog), and provides detection guidance, noting the issue is considered 'working as intended' by Kubernetes.

Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission

Comments

No comments yet

Be the first to share your thoughts!

Browser Extension

Get instant access to AllDevBlogs from your browser

Top of the Week