Description
Kubetail is a real-time logging dashboard for Kubernetes. Prior to 0.14.0, Kubetail's dashboard exposes WebSocket endpoints that did not adequately validate the Origin header on connection upgrade. A malicious web page visited by a user with an active Kubetail session could open a WebSocket to the user's dashboard and read their Kubernetes logs in real time. This is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability and affects both the desktop deployment (default http://localhost:7500) and cluster deployments (typically behind an Ingress with HTTP basic auth). This vulnerability is fixed in 0.14.0.
Published: 2026-05-14
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Kubetail, a real‑time logging dashboard, contained a Cross‑Site WebSocket Hijacking flaw that allowed an attacker to read live Kubernetes logs from a user who was already authenticated to the dashboard. The weakness stemmed from insufficient validation of the Origin header on WebSocket upgrades, enabling a malicious web page to open a WebSocket connection to the dashboard and receive log data. The primary impact is a confidentiality breach; attackers could harvest sensitive information from the logs, potentially exposing application states, credentials, or other valuable operational data. This vulnerability is classified as CWE‑1385, indicating broken confidentiality via improper web socket handling.

Affected Systems

The affected product is kubetail provided by kubetail‑org, comprising the cli, dashboard, and core components. Any deployment using versions prior to 0.14.0 is vulnerable, including the default desktop instance running on http://localhost:7500 and cluster deployments exposed behind an Ingress with HTTP basic authentication. Users of earlier releases should verify their version and apply the fix before proceeding.

Risk and Exploitability

The CVSS score of 6.5 denotes a moderate severity risk. The EPSS score is not publicly available, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited evidence of active exploitation in the wild. Based on the description, likely attack vectors involve a user mistakenly visiting a malicious webpage while maintaining an active Kubetail session, after which the attacker can hijack the WebSocket connection and stream logs in real time. Because the attack requires only a valid session and cross‑site script execution, the exploitation likelihood is reasonable for social engineering or phishing campaigns targeting administrators.

Generated by OpenCVE AI on May 14, 2026 at 18:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kubetail to version 0.14.0 or later, which implements proper Origin header validation for WebSocket connections.
  • Configure the dashboard and any Ingress or proxy to enforce strict [SameSite] policies or to block cross‑origin WebSocket upgrades when the Origin header is missing or mismatched.
  • Restrict dashboard access to trusted networks or VPNs, and consider requiring two‑factor authentication so that only authenticated users can obtain a session for WebSocket hijacking.

Generated by OpenCVE AI on May 14, 2026 at 18:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v8j7-hp7c-738f Kubetail has a Cross-Site WebSocket Hijacking issue that allows attacker to read Kubernetes logs from authenticated users
History

Thu, 14 May 2026 17:00:00 +0000

Type Values Removed Values Added
Description Kubetail is a real-time logging dashboard for Kubernetes. Prior to 0.14.0, Kubetail's dashboard exposes WebSocket endpoints that did not adequately validate the Origin header on connection upgrade. A malicious web page visited by a user with an active Kubetail session could open a WebSocket to the user's dashboard and read their Kubernetes logs in real time. This is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability and affects both the desktop deployment (default http://localhost:7500) and cluster deployments (typically behind an Ingress with HTTP basic auth). This vulnerability is fixed in 0.14.0.
Title Kubetail: Cross-Site WebSocket Hijacking allows attacker to read Kubernetes logs from authenticated users
Weaknesses CWE-1385
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-14T16:20:11.743Z

Reserved: 2026-05-06T18:28:20.887Z

Link: CVE-2026-44514

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-14T17:16:23.043

Modified: 2026-05-14T18:31:45.970

Link: CVE-2026-44514

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T18:30:26Z

Weaknesses