In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-30T16:25:36.231Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29954
No data.
Status : Received
Published: 2026-03-30T17:16:15.867
Modified: 2026-03-30T17:16:15.867
Link: CVE-2026-29954
No data.
OpenCVE Enrichment
No data.