Description
Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization.
INFO
Published Date :
2026-02-12T21:07:17.914Z
Last Modified :
2026-02-12T21:36:37.816Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-26055 vulnerability.
| Vendors | Products |
|---|---|
| Yokecd |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-26055.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact