CVE-2026-26056: Yoke
CVE-2026-26056
Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. It allows users with CR crea...
Overview
A significant security vulnerability has been identified in Yoke, an infrastructure-as-code tool for deploying packages. This flaw allows an attacker with basic permissions to execute unauthorized code and potentially gain full control over a Kubernetes cluster.
Vulnerability Explained
In simple terms, Yoke uses a component called the Air Traffic Controller (ATC) to manage deployments. This component has a feature that allows users to customize deployments by pointing to external code modules (WASM files). The vulnerability exists because the ATC does not properly check or restrict the source of these modules.
An attacker who already has permission to create or update certain resources in the cluster can abuse this feature. By injecting a malicious web address (URL) into a specific annotation (overrides.yoke.cd/flight), they can trick the ATC into downloading and executing harmful code from an external server they control. This code runs with the high-level permissions of the ATC controller itself.
Potential Impact
The consequences of this vulnerability are severe:
- Resource Creation: Attackers can create any Kubernetes resource (like pods, secrets, or services) within the cluster.
- Privilege Escalation: By creating these resources, an attacker can potentially escalate their privileges to
cluster-adminlevel, granting them complete control over the entire Kubernetes environment. - Data Breach & System Compromise: Full cluster access allows for theft of sensitive data, deployment of cryptocurrency miners, disruption of services, or establishment of a persistent foothold for further attacks.
This is classified as a HIGH severity vulnerability with a CVSS score of 8.8.
Remediation and Mitigation
Primary Action: Immediate Upgrade The core fix is to upgrade Yoke to version 0.20.0 or later, where this vulnerability has been patched. Update your Yoke installation and controller as soon as possible.
Immediate Mitigation (If Upgrade is Delayed):
- Restrict Permissions: Immediately audit and tighten Kubernetes RBAC (Role-Based Access Control) permissions. Minimize the number of users and service accounts that have
createorupdatepermissions on resources that can be targeted by Yoke (likeFlights). - Network Policies: Implement Kubernetes Network Policies to block egress traffic from the ATC controller pod to the public internet, preventing it from downloading external WASM modules. This may break legitimate functionality if you use external overrides.
- Admission Controller: Consider using a validating admission webhook to reject any resource containing the
overrides.yoke.cd/flightannotation until the upgrade is complete.
General Recommendation: Always follow the principle of least privilege for users and service accounts in your clusters to limit the blast radius of such vulnerabilities.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-26056?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user ...
The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to arbitrary method calls in all versions up to, and in...
Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vulnerability in the H5P Import feature allows authenticated users with Teacher role to achieve Remote C...
Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Hi...