CVE-2025-66404: mcp-server-kubernetes has potential security issue in exec_in_pod tool
(updated )
A security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent.
References
- github.com/Flux159/mcp-server-kubernetes
- github.com/Flux159/mcp-server-kubernetes/commit/47d3136dd272c947464524f11f47bb519814698e
- github.com/Flux159/mcp-server-kubernetes/commit/d091107ff92d9ffad1b3c295092f142d6578c48b
- github.com/Flux159/mcp-server-kubernetes/security/advisories/GHSA-wvxp-jp4w-w8wg
- github.com/advisories/GHSA-wvxp-jp4w-w8wg
- nvd.nist.gov/vuln/detail/CVE-2025-66404
Code Behaviors & Features
Detect and mitigate CVE-2025-66404 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →