Impact
Helm’s plugin verification logic bypasses signature checks when the provenance file (.prov) is missing, enabling the installation of unsigned plugins as if they were legitimate. This flaw permits an attacker to deploy arbitrary code through a malicious plugin that will run with the privileges of the Helm process and potentially affect the Kubernetes cluster environment.
Affected Systems
Helm releases from 4.0.0 through 4.1.3 are affected. The vulnerability has been remediated in Helm 4.1.4, which restores proper provenance verification before plugin installation.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.4, placing it in the high‑severity range. An EPSS score is not provided and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred to involve an adversary supplying a plugin without a provenance file to the Helm installation process; however, the precise exploitation steps are not detailed in the available information.
OpenCVE Enrichment
Github GHSA