Description
Kruise provides automated management of large-scale applications on Kubernetes. Prior to versions 1.8.3 and 1.7.5, PodProbeMarker allows defining custom probes with TCPSocket or HTTPGet handlers. The webhook validation does not restrict the Host field in these probe configurations. Since kruise-daemon runs with hostNetwork=true, it executes probes from the node network namespace. An attacker with PodProbeMarker creation permission can specify arbitrary Host values to trigger SSRF from the node, perform port scanning, and receive response feedback through NodePodProbe status messages. Versions 1.8.3 and 1.7.5 patch the issue.
Published: 2026-02-25
Score: 0 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted Host Field SSRF in OpenKruise PodProbeMarker permits a privileged actor to force the kubelet to send arbitrary requests from the node network namespace, allowing port scanning or data exfiltration
Action: Patch Immediately
AI Analysis

Impact

The flaw lies in the validation of the Host field of TCPSocket or HTTPGet handlers in PodProbeMarker objects. The admission webhook does not constrain this field, and because kruise‑daemon operates with hostNetwork=true, the probes execute in the node’s network namespace. This turns the node into a proxy that can reach internal or external services specified by the attacker, resulting in server‑side request forgery (SSRF). The consequence is a breach of confidentiality and network isolation, potentially exposing private networks or other cluster nodes. The weakness is a classic insecure input validation issue (CWE‑918).

Affected Systems

Affected systems include deployments of OpenKruise Kruise version 1.7.4 and earlier, and versions up to 1.8.2. Versions 1.8.3 and 1.7.5 are patched and no longer vulnerable. If a user employs a different branch or fork it is recommended to review the same code path that is impacted in the released patches.

Risk and Exploitability

The EPSS score is below 1%, indicating a very low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. Nonetheless, because the flaw allows arbitrary network requests from the node, the potential impact is significant if an attacker gains PodProbeMarker creation rights. The control plane’s admission webhook is a central point of attack, and exploitation requires the ability to create or modify PodProbeMarker objects. The attack vector is inferred to be from within the cluster, leveraging permissions to create PodProbeMarker resources.

Generated by OpenCVE AI on April 18, 2026 at 10:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to OpenKruise Kruise v1.8.3 or v1.7.5 to eliminate the SSRF vulnerability
  • Restrict PodProbeMarker creation permissions to trusted administrators alone
  • If an immediate upgrade is not possible, disable hostNetwork for the kruise‑daemon to prevent probes from executing in the node’s namespace
  • Monitor NodePodProbe status logs for anomalous external requests and consider blocking suspicious Host values at the admission webhook

Generated by OpenCVE AI on April 18, 2026 at 10:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9fj4-3849-rv9g OpenKruise PodProbeMarker is Vulnerable to SSRF via Unrestricted Host Field
History

Thu, 05 Mar 2026 00:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openkruise:kruise:*:*:*:*:*:*:*:*

Sat, 28 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Openkruise
Openkruise kruise
Vendors & Products Openkruise
Openkruise kruise

Wed, 25 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description Kruise provides automated management of large-scale applications on Kubernetes. Prior to versions 1.8.3 and 1.7.5, PodProbeMarker allows defining custom probes with TCPSocket or HTTPGet handlers. The webhook validation does not restrict the Host field in these probe configurations. Since kruise-daemon runs with hostNetwork=true, it executes probes from the node network namespace. An attacker with PodProbeMarker creation permission can specify arbitrary Host values to trigger SSRF from the node, perform port scanning, and receive response feedback through NodePodProbe status messages. Versions 1.8.3 and 1.7.5 patch the issue.
Title OpenKruise PodProbeMarker is Vulnerable to SSRF via Unrestricted Host Field
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N'}


Subscriptions

Openkruise Kruise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T20:44:09.282Z

Reserved: 2026-01-19T18:49:20.659Z

Link: CVE-2026-24005

cve-icon Vulnrichment

Updated: 2026-02-26T20:43:50.880Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T19:43:21.163

Modified: 2026-03-05T00:42:25.553

Link: CVE-2026-24005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:45:43Z

Weaknesses