In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection.
History

Mon, 30 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T16:25:36.231Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29954

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-30T17:16:15.867

Modified: 2026-03-30T17:16:15.867

Link: CVE-2026-29954

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.