CVE-2026-26056

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. It allows users with CR create/update permissions to execute arbitrary WASM code in the ATC controller context by injecting a malicious URL through the overrides.yoke.cd/flight annotation. The ATC controller downloads and executes the WASM module without proper URL validation, enabling attackers to create arbitrary Kubernetes resources or potentially escalate privileges to cluster-admin level.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:yokecd:yoke:*:*:*:*:*:*:*:*

History

01 Apr 2026, 20:53

Type Values Removed Values Added
Summary
  • (es) Yoke es un desplegador de paquetes de infraestructura como código (IaC) inspirado en Helm. En la versión 0.19.0 y anteriores, existe una vulnerabilidad en el componente Air Traffic Controller (ATC) de Yoke. Permite a los usuarios con permisos de creación/actualización de CR ejecutar código WASM arbitrario en el contexto del controlador ATC inyectando una URL maliciosa a través de la anotación overrides.yoke.cd/flight. El controlador ATC descarga y ejecuta el módulo WASM sin una validación de URL adecuada, lo que permite a los atacantes crear recursos arbitrarios de Kubernetes o potencialmente escalar privilegios a nivel de cluster-admin.
References () https://github.com/yokecd/yoke/security/advisories/GHSA-wj8p-jj64-h7ff - () https://github.com/yokecd/yoke/security/advisories/GHSA-wj8p-jj64-h7ff - Exploit, Vendor Advisory
First Time Yokecd
Yokecd yoke
CPE cpe:2.3:a:yokecd:yoke:*:*:*:*:*:*:*:*

12 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-12 22:16

Updated : 2026-04-01 20:53


NVD link : CVE-2026-26056

Mitre link : CVE-2026-26056

CVE.ORG link : CVE-2026-26056


JSON object : View

Products Affected

yokecd

  • yoke
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')