Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Critical CVEs in Chaos-Mesh Enable In-Cluster Code Execution
Cyber Security

Critical CVEs in Chaos-Mesh Enable In-Cluster Code Execution

Team-CWDBy Team-CWDSeptember 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Multiple CVEs in the Chaos-Mesh platform have been discovered, including three critical vulnerabilities that allow in-cluster attackers to run arbitrary code on any pod, even in the default configuration.

According to new research by JFrog Security Research, the flaws are tracked as CVE-2025-59358, CVE-2025-59360, CVE-2025-59361 and CVE-2025-59359. They affect the Chaos Controller Manager and expose a GraphQL debug server that accepts unauthenticated queries.

JFrog’s analysis, published on Tuesday, shows the controller exposes a ClusterIP GraphQL endpoint on port 10082 that, by default, does not enforce authentication for the /query path.

Attackers with network access inside a cluster can call GraphQL mutations to trigger native fault injections, such as killing processes and modifying iptables.

“Platforms such as Chaos-Mesh give, by design, complete control of the Kubernetes cluster to the platform,” said Shachar Menashe, VP of security research at JFrog.

“This flexibility can become a critical risk when vulnerabilities such as Chaotic Deputy are discovered.”

The three critical CVEs (CVE-2025-59360, CVE-2025-59361 and CVE-2025-59359) each have a CVSS score of 9.8 and allow straightforward OS command injection because user input is concatenated directly into shell commands executed via the platform’s ExecBypass routine.

Read more on attacks targeting GraphQL: AI Surge Drives Record 1205% Increase in API Vulnerabilities

How Attackers Can Exploit Chaotic Deputy

The Controller Manager can instruct the Chaos Daemon to run commands on other pods.

Using exposed namespaces under /proc//root and the nsexec helper, an attacker can copy service account tokens from target pods into their own pod, thereby escalating privileges cluster-wide.

Demonstrations include executing a killProcesses mutation against kube-apiserver and copying tokens via a crafted cleanTcs request. Managed offerings that integrate Chaos-Mesh, such as Azure Chaos Studio, may also be affected.

Key affected elements include:

  • Exposed GraphQL /query endpoint on port 10082

  • Command-building in cleanTcs, killProcesses, cleanIptables resolvers

  • Ability to access other pods’ files via /proc based nsexec

Patches, Workarounds and Security Response

Users are urged to upgrade to Chaos-Mesh 2.7.3 immediately.

“We recommend that Chaos-Mesh users upgrade swiftly since these vulnerabilities are extremely easy to exploit and lead to total cluster takeover,” Menashe added.

“We also want to offer our thanks to the Chaos-Mesh maintainers for their rapid response and collaboration in addressing these critical security issues.”

As a temporary workaround, redeploying the Helm chart with the control server disabled will reduce exposure.

The report concludes that while external exploitation requires cluster network access, in-cluster compromises are common enough to make these vulnerabilities highly dangerous and easy to exploit.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFileFix Campaign Using Steganography and Multistage Payloads
Next Article Vibe Coding: Managing the Strategic Security Risks of AI-Accelerated D
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Chronology of a Skype attack

February 5, 2026

AI-powered financial scams swamp social media

September 11, 2025

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.