CVE-2026-26056

8.8 HIGH

📋 TL;DR

This vulnerability allows users with create/update permissions in Yoke's Air Traffic Controller to execute arbitrary WASM code by injecting malicious URLs through annotations. Attackers can create arbitrary Kubernetes resources or escalate to cluster-admin privileges. Affects Yoke versions 0.19.0 and earlier.

💻 Affected Systems

Products:
  • Yoke
Versions: 0.19.0 and earlier
Operating Systems: All platforms running Yoke
Default Config Vulnerable: ⚠️ Yes
Notes: Requires users with CR create/update permissions in the ATC component. Exploitation depends on network policies allowing external WASM downloads.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full cluster compromise with cluster-admin privileges, allowing complete control over all Kubernetes resources and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized creation/modification of Kubernetes resources, data exfiltration, or service disruption within the affected cluster.

🟢

If Mitigated

Limited impact if proper RBAC controls restrict user permissions and network policies prevent external WASM module downloads.

🌐 Internet-Facing: MEDIUM - Requires user permissions but can download external WASM modules if network policies allow.
🏢 Internal Only: HIGH - Internal users with appropriate permissions can exploit this without external network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user with appropriate permissions. The vulnerability is straightforward to exploit once permissions are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.19.1 or later

Vendor Advisory: https://github.com/yokecd/yoke/security/advisories/GHSA-wj8p-jj64-h7ff

Restart Required: Yes

Instructions:

1. Update Yoke to version 0.19.1 or later. 2. Restart all ATC controller pods. 3. Verify the update by checking controller logs for successful startup.

🔧 Temporary Workarounds

Restrict ATC Controller Network Access

all

Apply network policies to prevent ATC controller from downloading external WASM modules

kubectl apply -f network-policy.yaml

Tighten RBAC Permissions

all

Restrict create/update permissions on ATC resources to only necessary users

kubectl edit clusterrolebinding
kubectl edit rolebinding

🧯 If You Can't Patch

  • Implement strict network policies to block all external WASM module downloads by ATC controllers
  • Apply least-privilege RBAC principles and audit all users with ATC create/update permissions

🔍 How to Verify

Check if Vulnerable:

Check Yoke version: yoke --version. If version is 0.19.0 or earlier, system is vulnerable.

Check Version:

yoke --version

Verify Fix Applied:

Verify yoke version is 0.19.1 or later and check ATC controller logs for successful startup without WASM download errors.

📡 Detection & Monitoring

Log Indicators:

  • ATC controller downloading WASM modules from external URLs
  • Unusual resource creation events in Kubernetes audit logs
  • Failed WASM module execution attempts

Network Indicators:

  • Outbound HTTP/HTTPS requests from ATC controllers to untrusted domains
  • WASM file downloads to ATC controller pods

SIEM Query:

source="kubernetes" ("yoke" OR "atc") AND ("download" OR "wasm" OR "override.yoke.cd/flight")

🔗 References

📤 Share & Export