KubeAI is an AI inference operator for kubernetes. Prior to 0.23.2, the ollamaStartupProbeScript() function in internal/modelcontroller/engine_ollama.go constructs a shell command string using fmt.Sprintf with unsanitized model URL components (ref, modelParam). This shell command is executed via bash -c as a Kubernetes startup probe. An attacker who can create or update Model custom resources can inject arbitrary shell commands that execute inside model server pods. This vulnerability is fixed in 0.23.2.
References
| Link | Resource |
|---|---|
| https://github.com/kubeai-project/kubeai/security/advisories/GHSA-324q-cwx9-7crr | Exploit Mitigation Vendor Advisory |
| https://github.com/kubeai-project/kubeai/security/advisories/GHSA-324q-cwx9-7crr | Exploit Mitigation Vendor Advisory |
Configurations
History
15 Apr 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.7 |
14 Apr 2026, 20:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | () https://github.com/kubeai-project/kubeai/security/advisories/GHSA-324q-cwx9-7crr - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Kubeai
Kubeai kubeai |
|
| CPE | cpe:2.3:a:kubeai:kubeai:*:*:*:*:*:kubernetes:*:* |
07 Apr 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/kubeai-project/kubeai/security/advisories/GHSA-324q-cwx9-7crr - |
06 Apr 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 16:16
Updated : 2026-04-15 21:17
NVD link : CVE-2026-34940
Mitre link : CVE-2026-34940
CVE.ORG link : CVE-2026-34940
JSON object : View
Products Affected
kubeai
- kubeai
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
