-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper input validation (CWE-20) in PowerShell command construction. The original implementations of isLinkPath and evalSymlink used fmt.Sprintf to directly embed user-controlled path parameters into PowerShell commands (Get-Item -LiteralPath %q). This pattern is vulnerable to command injection if the path contains PowerShell subexpressions. The patch mitigates this by using environment variables to pass paths, preventing command interpretation. The commit diff and CVE description explicitly reference these functions as the attack vector for privilege escalation on Windows nodes.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| k8s.io/kubernetes | go | = 1.28.0 | 1.28.1 |
| k8s.io/kubernetes | go | >= 1.27.0, < 1.27.5 | 1.27.5 |
| k8s.io/kubernetes | go | >= 1.26.0, < 1.26.8 | 1.26.8 |
| k8s.io/kubernetes | go | >= 1.25.0, < 1.25.13 | 1.25.13 |
| k8s.io/kubernetes | go | < 1.24.17 | 1.24.17 |
Ongoing coverage of React2Shell