CVE-2025-59376: mcp-kubernetes-server has a Command Injection vulnerability
(updated )
mcp-kubernetes-server does not correctly enforce the --disable-write / --disable-delete protections when commands are chained. The server only inspects the first token to decide whether an operation is write/delete, which allows a read-like command to be followed by a write action using shell metacharacters (e.g., kubectl version; kubectl delete pod <name>). A remote attacker who can invoke the server may therefore bypass the intended write/delete restrictions and perform state-changing operations against the Kubernetes cluster.
Affected versions: through 0.1.11 (no patched release available as of now).
Mitigations:
- Run with
--disable-kubectland/or--disable-helmto fully block those execution paths. - Put the server behind an allow-list proxy restricting allowed subcommands.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-59376 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →