Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-965m-v4cc-6334 | Unauthenticated Admission Webhook Endpoints in Yoke ATC |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization. | |
| Title | Unauthenticated Admission Webhook Endpoints in Yoke ATC | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-12T21:36:37.816Z
Reserved: 2026-02-10T18:01:31.899Z
Link: CVE-2026-26055
Updated: 2026-02-12T21:36:28.213Z
Status : Received
Published: 2026-02-12T22:16:06.190
Modified: 2026-02-12T22:16:06.190
Link: CVE-2026-26055
No data.
OpenCVE Enrichment
No data.
Github GHSA