CVE-2026-32241

Flannel is a network fabric for containers, designed for Kubernetes. The Flannel project includes an experimental Extension backend that allows users to easily prototype new backend types. In versions of Flannel prior to 0.28.2, this Extension backend is vulnerable to a command injection that allows an attacker who can set Kubernetes Node annotations to achieve root-level arbitrary command execution on every flannel node in the cluster. The Extension backend's SubnetAddCommand and SubnetRemoveCommand receive attacker-controlled data via stdin (from the `flannel.alpha.coreos.com/backend-data` Node annotation). The content of this annotation is unmarshalled and piped directly to a shell command without checks. Kubernetes clusters using Flannel with the Extension backend are affected by this vulnerability. Other backends such as vxlan and wireguard are unaffected. The vulnerability is fixed in version v0.28.2. As a workaround, use Flannel with another backend such as vxlan or wireguard.
Configurations

Configuration 1 (hide)

cpe:2.3:a:flannel-io:flannel:*:*:*:*:*:kubernetes:*:*

History

08 Apr 2026, 15:29

Type Values Removed Values Added
References () https://github.com/flannel-io/flannel/releases/tag/v0.28.2 - () https://github.com/flannel-io/flannel/releases/tag/v0.28.2 - Product, Release Notes
References () https://github.com/flannel-io/flannel/security/advisories/GHSA-vchx-5pr6-ffx2 - () https://github.com/flannel-io/flannel/security/advisories/GHSA-vchx-5pr6-ffx2 - Mitigation, Vendor Advisory
CPE cpe:2.3:a:flannel-io:flannel:*:*:*:*:*:kubernetes:*:*
First Time Flannel-io flannel
Flannel-io

27 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 20:16

Updated : 2026-04-08 15:29


NVD link : CVE-2026-32241

Mitre link : CVE-2026-32241

CVE.ORG link : CVE-2026-32241


JSON object : View

Products Affected

flannel-io

  • flannel
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')