Impact
An open source component of Kubectl MCP Server, specifically version 1.1.1, contains a flaw that permits an attacker to run arbitrary code on a system when a user interacts with a specially crafted HTML page. The vulnerability hosts the ability to execute code with the privileges of the executable, potentially giving attackers full control over the host.
Affected Systems
The affected product is Kubectl MCP Server version 1.1.1. No vendor or product name is associated in the CNA data, indicating that the tool is maintained by an open source community.
Risk and Exploitability
The attack vector involves user interaction with a malicious web page, suggesting that the flaw is exploitable by a user who visits or otherwise renders the crafted content. EPSS data is not available and the issue is not listed in CISA's KEV catalog, but the presence of remote code execution grants a high severity. In the absence of public exploit evidence, the likelihood of an ongoing attack remains uncertain; nevertheless, the potential impact is severe enough to warrant rapid response.
OpenCVE Enrichment