Description
Helm is a package manager for Charts for Kubernetes. In Helm versions <=3.20.1 and <=4.1.3, a specially crafted Chart will cause helm pull --untar [chart URL | repo/chartname] to write the Chart's contents to the immediate output directory (as defaulted to the current working directory; or as given by the --destination and --untardir flags), rather than the expected output directory suffixed by the chart's name. This vulnerability is fixed in 3.20.2 and 4.1.4.
Published: 2026-04-09
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local File System Modification
Action: Patch
AI Analysis

Impact

A craftable Chart that contains a name with a dot‑segment can cause the Helm pull and untar operation to write files into the immediate working directory instead of the intended chart subdirectory. This results in arbitrary file placement or overwrite within the local file system where Helm is executed, potentially allowing a local attacker to replace or corrupt configuration files. The weakness is a file path traversal issue, classified as CWE‑22.

Affected Systems

Helm, the package manager for Kubernetes charts, is affected in all releases older than v3.20.2 and v4.1.4. The issue appears in Helm versions 3.20.1 and earlier and 4.1.3 and earlier. Updating to 3.20.2 or any newer 3.x release, or to 4.1.4 or newer 4.x releases, removes the vulnerability.

Risk and Exploitability

The CVSS score of 4.8 indicates a medium severity risk. No EPSS data is available, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires that the attacker supply or influence the Chart pulled by Helm; thus the attack vector is local to the user running Helm. An attacker who can trick a Helm client into pulling a malicious chart may place files at an arbitrary path within the user’s workspace, which could lead to privilege escalation or disrupt service operation.

Generated by OpenCVE AI on April 9, 2026 at 22:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Helm to version 3.20.2 or later, or 4.1.4 or later, to eliminate the extraction path collapse.
  • Confirm that only trusted and signed chart repositories are used to prevent unauthorized chart delivery.
  • Use isolated or dedicated working directories when running Helm to reduce the impact of any remaining extraction issues.

Generated by OpenCVE AI on April 9, 2026 at 22:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hr2v-4r36-88hr Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment
History

Thu, 16 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*

Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}

threat_severity

Moderate


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Helm
Helm helm
Vendors & Products Helm
Helm helm

Thu, 09 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Description Helm is a package manager for Charts for Kubernetes. In Helm versions <=3.20.1 and <=4.1.3, a specially crafted Chart will cause helm pull --untar [chart URL | repo/chartname] to write the Chart's contents to the immediate output directory (as defaulted to the current working directory; or as given by the --destination and --untardir flags), rather than the expected output directory suffixed by the chart's name. This vulnerability is fixed in 3.20.2 and 4.1.4.
Title Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-14T14:45:12.096Z

Reserved: 2026-04-01T18:48:58.937Z

Link: CVE-2026-35206

cve-icon Vulnrichment

Updated: 2026-04-14T14:45:08.743Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T21:16:09.993

Modified: 2026-04-16T20:36:08.770

Link: CVE-2026-35206

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-09T21:02:13Z

Links: CVE-2026-35206 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:07Z

Weaknesses