CVE-2026-29954 โ In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components haveโฆ
Image via github.githubassets.com
๐จ CVE-2026-29954 In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address.
CVE-Request: KubePlus ResourceComposition ChartURL SSRF + Header Injection
gist.github.com
What This Means For You
- Rated critical severity โ prioritize patching or mitigation.
- New vulnerability disclosed โ verify if your stack is exposed.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-29954 | SSRF | KubePlus 4.1.4, mutating webhook component, processing chartURL field of ResourceComposition resources, URL-encoded without validating target address. |
| CVE-2026-29954 | Command Injection | KubePlus 4.1.4, kubeconfiggenerator component, processing chartURL field of ResourceComposition resources, chartURL directly concatenated into wget command, allowing --header option injection. |
| CVE-2026-29954 | HTTP Header Injection | KubePlus 4.1.4, kubeconfiggenerator component, processing chartURL field of ResourceComposition resources, chartURL directly concatenated into wget command, allowing --header option injection. |
๐
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic โ straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot โ
Source & Attribution
| Source Platform | Telegram |
| Channel | CVE Notify |
| Published | April 06, 2026 at 18:56 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.