Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26055: CWE-306: Missing Authentication for Critical Function in yokecd yoke

0
High
VulnerabilityCVE-2026-26055cvecve-2026-26055cwe-306
Published: Thu Feb 12 2026 (02/12/2026, 21:07:17 UTC)
Source: CVE Database V5
Vendor/Project: yokecd
Product: yoke

Description

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 22:18:35 UTC

Technical Analysis

CVE-2026-26055 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting the Yoke infrastructure-as-code package deployer, versions 0.19.0 and earlier. Yoke's Air Traffic Controller (ATC) component exposes webhook endpoints designed to handle AdmissionReview requests, which are part of Kubernetes admission control workflows. However, these endpoints lack proper authentication mechanisms, allowing any pod within the same Kubernetes cluster network to send AdmissionReview requests directly to the ATC webhook. This effectively bypasses the Kubernetes API Server's authentication and authorization controls. As a result, an attacker controlling a pod inside the cluster can trigger WebAssembly (WASM) module execution within the ATC controller context without proper authorization. This unauthorized execution can lead to integrity violations, such as unauthorized changes to deployment configurations or infrastructure state managed by Yoke. The vulnerability has a CVSS v3.1 score of 7.5, reflecting high severity due to network attack vector, no privileges required, no user interaction, and impact on integrity. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights a critical security design flaw in the ATC webhook authentication model, emphasizing the need for strict access controls on internal cluster components that handle sensitive admission requests.

Potential Impact

For European organizations deploying Kubernetes clusters with Yoke versions 0.19.0 or earlier, this vulnerability poses a significant risk to the integrity of their infrastructure-as-code deployments. An attacker who gains control of any pod within the cluster network can exploit this flaw to execute unauthorized WASM modules in the ATC controller context, potentially altering deployment configurations or injecting malicious code. This can lead to compromised application behavior, unauthorized infrastructure changes, and a loss of trust in automated deployment pipelines. While confidentiality and availability are not directly impacted, the integrity breach can cascade into broader security incidents, including privilege escalation or lateral movement within the cluster. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, critical infrastructure) may face regulatory and reputational risks if such unauthorized modifications occur. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the threat level in multi-tenant or shared Kubernetes environments common in European enterprises.

Mitigation Recommendations

European organizations should immediately audit their Kubernetes clusters for Yoke usage and verify the version in deployment. Upgrading Yoke to a version later than 0.19.0, once available, is the primary mitigation step. Until a patch is released, organizations should implement network segmentation within the cluster to restrict pod-to-pod communication, especially limiting access to the ATC webhook endpoints. Employ Kubernetes Network Policies to enforce strict ingress rules that only allow trusted pods or namespaces to communicate with the ATC component. Additionally, consider deploying admission controllers or service meshes that can enforce authentication and authorization on internal webhook calls. Monitoring and logging AdmissionReview requests to the ATC webhook can help detect anomalous or unauthorized access attempts. Finally, review and harden the cluster's overall security posture, including pod security policies and least privilege principles, to reduce the risk of pod compromise that could lead to exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-10T18:01:31.899Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698e4e5cc9e1ff5ad8206a3c

Added to database: 2/12/2026, 10:04:12 PM

Last enriched: 2/12/2026, 10:18:35 PM

Last updated: 3/30/2026, 1:34:34 AM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses