Description
Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization.
Published: 2026-02-12
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Air Traffic Controller component of Yoke, a Helm‑inspired infrastructure-as-code package deployer. The ATC webhook endpoints lack authentication, allowing any pod that can reach the cluster network to send AdmissionReview requests directly to the webhook. This bypasses Kubernetes API Server authentication and enables an attacker to trigger the execution of WebAssembly modules within the ATC controller context without authorization, effectively granting the ability to run arbitrary code in the cluster’s management plane.

Affected Systems

Yoke version 0.19.0 and earlier are affected. The product, distributed by yokecd, is the Yoke IaC deployer, and the flaw is present in its ATC component that runs within a Kubernetes cluster. All pods with network reach to the ATC webhook are potential launchpads for exploitation, regardless of workload or cluster configuration.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. The EPSS score is less than 1 % suggesting current exploitation probability is low, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is any pod inside the cluster that can reach the ATC webhook; once the attacker creates or uses such a pod, crafted AdmissionReview requests can trigger malicious WASM execution. This would grant execution of arbitrary code with the privileges of the ATC controller, potentially enabling full cluster compromise.

Generated by OpenCVE AI on April 17, 2026 at 19:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Yoke to a release after 0.19.0 that includes authentication for the ATC webhook.
  • Restrict network access to the ATC webhook so that only the Kubernetes API Server or trusted services can reach it, using network policies or a service mesh.
  • If an upgrade cannot be performed immediately, enforce Pod Security Policies or RBAC rules to prevent arbitrary pods from sending AdmissionReview requests to the webhook, effectively blocking the attack path.

Generated by OpenCVE AI on April 17, 2026 at 19:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-965m-v4cc-6334 Unauthenticated Admission Webhook Endpoints in Yoke ATC
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yokecd:yoke:*:*:*:*:*:*:*:*

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Yokecd
Yokecd yoke
Vendors & Products Yokecd
Yokecd yoke

Thu, 12 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization.
Title Unauthenticated Admission Webhook Endpoints in Yoke ATC
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-12T21:36:37.816Z

Reserved: 2026-02-10T18:01:31.899Z

Link: CVE-2026-26055

cve-icon Vulnrichment

Updated: 2026-02-12T21:36:28.213Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-12T22:16:06.190

Modified: 2026-04-01T20:57:00.640

Link: CVE-2026-26055

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:00:09Z

Weaknesses