Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SSRF and HTTP Header Injection in KubePlus 4.1.4 |
Mon, 30 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 CWE-918 |
|
| Metrics |
cvssV3_1
|
Mon, 30 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-30T18:42:18.548Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29954
Updated: 2026-03-30T18:39:20.851Z
Status : Awaiting Analysis
Published: 2026-03-30T17:16:15.867
Modified: 2026-04-01T14:24:21.833
Link: CVE-2026-29954
No data.
OpenCVE Enrichment
Updated: 2026-03-30T20:56:28Z