Description
An issue in Open Source Kubectl MCP Server v1.1.1 allows attackers to execute arbitrary code on a victim system via user interaction with a crafted HTML page.
Published: 2026-05-12
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An open source component of Kubectl MCP Server, specifically version 1.1.1, contains a flaw that permits an attacker to run arbitrary code on a system when a user interacts with a specially crafted HTML page. The vulnerability hosts the ability to execute code with the privileges of the executable, potentially giving attackers full control over the host.

Affected Systems

The affected product is Kubectl MCP Server version 1.1.1. No vendor or product name is associated in the CNA data, indicating that the tool is maintained by an open source community.

Risk and Exploitability

The attack vector involves user interaction with a malicious web page, suggesting that the flaw is exploitable by a user who visits or otherwise renders the crafted content. EPSS data is not available and the issue is not listed in CISA's KEV catalog, but the presence of remote code execution grants a high severity. In the absence of public exploit evidence, the likelihood of an ongoing attack remains uncertain; nevertheless, the potential impact is severe enough to warrant rapid response.

Generated by OpenCVE AI on May 12, 2026 at 17:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Kubectl MCP Server to a patched release—check the project's repository or package manager for an updated version that addresses this issue.
  • Restrict network access to the server by applying firewall rules that limit connections to trusted networks or IP ranges.
  • Disable or remove the service on systems that do not need it, and monitor for any remaining HTTP endpoints that could be leveraged for exploitation.

Generated by OpenCVE AI on May 12, 2026 at 17:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Rohitg00
Rohitg00 kubectl-mcp-server
Vendors & Products Rohitg00
Rohitg00 kubectl-mcp-server

Tue, 12 May 2026 18:00:00 +0000

Type Values Removed Values Added
Title Open Source Kubectl MCP Server Arbitrary Code Execution via Crafted HTML Interaction
Weaknesses CWE-20
CWE-79

Tue, 12 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description An issue in Open Source Kubectl MCP Server v1.1.1 allows attackers to execute arbitrary code on a victim system via user interaction with a crafted HTML page.
References

Subscriptions

Rohitg00 Kubectl-mcp-server
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-12T16:01:56.661Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65719

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T17:16:15.140

Modified: 2026-05-12T17:16:15.140

Link: CVE-2025-65719

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T19:00:18Z

Weaknesses