Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32241: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in flannel-io flannel

0
High
VulnerabilityCVE-2026-32241cvecve-2026-32241cwe-77
Published: Fri Mar 27 2026 (03/27/2026, 19:31:48 UTC)
Source: CVE Database V5
Vendor/Project: flannel-io
Product: flannel

Description

Flannel is a network fabric for containers, designed for Kubernetes. The Flannel project includes an experimental Extension backend that allows users to easily prototype new backend types. In versions of Flannel prior to 0.28.2, this Extension backend is vulnerable to a command injection that allows an attacker who can set Kubernetes Node annotations to achieve root-level arbitrary command execution on every flannel node in the cluster. The Extension backend's SubnetAddCommand and SubnetRemoveCommand receive attacker-controlled data via stdin (from the `flannel.alpha.coreos.com/backend-data` Node annotation). The content of this annotation is unmarshalled and piped directly to a shell command without checks. Kubernetes clusters using Flannel with the Extension backend are affected by this vulnerability. Other backends such as vxlan and wireguard are unaffected. The vulnerability is fixed in version v0.28.2. As a workaround, use Flannel with another backend such as vxlan or wireguard.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:59:51 UTC

Technical Analysis

Flannel is a popular network fabric solution used in Kubernetes environments to provide overlay networking for containerized workloads. The vulnerability CVE-2026-32241 affects the experimental Extension backend of Flannel versions prior to 0.28.2. This backend allows users to prototype new backend types and relies on Kubernetes Node annotations to receive configuration data. Specifically, the SubnetAddCommand and SubnetRemoveCommand functions read data from the flannel.alpha.coreos.com/backend-data annotation, unmarshalling it and then piping it directly into shell commands without any validation or sanitization. This improper neutralization of special elements (CWE-77) leads to command injection, enabling an attacker who can modify Node annotations to execute arbitrary commands with root privileges on every node running Flannel in the cluster. Since Kubernetes Node annotations can be modified by users with certain cluster privileges, this vulnerability effectively escalates privileges and compromises the entire cluster’s node security. The vulnerability does not affect other Flannel backends such as vxlan or wireguard. The issue was publicly disclosed on March 27, 2026, with a CVSS 3.1 base score of 7.5, indicating high severity. No public exploits have been reported yet. The fix was introduced in Flannel version 0.28.2, which properly sanitizes input and prevents command injection. As a workaround, users can switch to unaffected backends until they upgrade.

Potential Impact

The impact of CVE-2026-32241 is significant for organizations running Kubernetes clusters with Flannel using the experimental Extension backend. Successful exploitation allows attackers with limited privileges (ability to set Node annotations) to gain root-level command execution on all nodes running Flannel, leading to full compromise of the cluster’s underlying infrastructure. This can result in data breaches, lateral movement within the cluster, disruption of container workloads, and potential persistence mechanisms. The vulnerability affects the confidentiality, integrity, and availability of the cluster environment. Given Kubernetes’ widespread use in cloud-native deployments, this vulnerability could disrupt critical business applications and services. Although no exploits are known in the wild yet, the ease of exploitation (no user interaction required, network accessible) and the scope (all nodes in the cluster) make this a high-risk issue. Organizations relying on the Extension backend face elevated risk of cluster-wide compromise if not remediated promptly.

Mitigation Recommendations

1. Upgrade Flannel to version 0.28.2 or later immediately to apply the official fix that sanitizes input and prevents command injection. 2. If upgrading is not immediately feasible, switch to a non-vulnerable backend such as vxlan or wireguard to eliminate exposure. 3. Restrict permissions to modify Kubernetes Node annotations to trusted administrators only, minimizing the risk of unauthorized annotation changes. 4. Implement Kubernetes Role-Based Access Control (RBAC) policies to tightly control who can edit Node annotations. 5. Monitor Kubernetes audit logs for suspicious annotation changes, especially to flannel.alpha.coreos.com/backend-data. 6. Employ runtime security tools to detect anomalous command execution on nodes running Flannel. 7. Regularly scan clusters for usage of the vulnerable Extension backend and track Flannel versions deployed. 8. Educate cluster operators about this vulnerability and the risks of using experimental backends in production environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T14:47:05.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6de373c064ed76fea1d6e

Added to database: 3/27/2026, 7:44:55 PM

Last enriched: 3/27/2026, 7:59:51 PM

Last updated: 3/27/2026, 10:40:00 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses