Impact
Helm contains a path traversal flaw in plugin metadata that allows an attacker to write arbitrary files outside the intended Helm plugin directory. This is a CWE‑22 weakness that can be leveraged to overwrite configuration files or executable binaries, potentially leading to privilege escalation or execution of malicious code. The effect is that the attacker can place or modify any file on the host file system where Helm runs, compromising system integrity.
Affected Systems
The vulnerability applies to Helm, the Kubernetes package manager, from version 4.0.0 up through 4.1.3. Users who installed or updated plugins during this period were exposed. The flaw was addressed in Helm release 4.1.4.
Risk and Exploitability
The CVSS score of 8.4 indicates high severity. Although EPSS data is not available and the vulnerability is not listed in the KEV catalog, exploitation is straightforward for anyone who can supply a malicious plugin during installation or update. The likely attack vector is remote, via a Helm client that trusts the plugin source or via a compromised plugin repository, allowing an attacker to deploy the faulting plugin and trigger the arbitrary file write.
OpenCVE Enrichment
Github GHSA