Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. mcp-server-kubernetes
  4. ›
  5. CVE-2026-39884

CVE-2026-39884: MCP Server Kubernetes has an Argument Injection in port_forward tool via space-splitting

April 14, 2026 (updated April 15, 2026)

The port_forward tool in mcp-server-kubernetes constructs a kubectl command as a string and splits it on spaces before passing to spawn(). Unlike all other tools in the codebase which correctly use execFileSync("kubectl", argsArray), port_forward uses string concatenation with user-controlled input (namespace, resourceType, resourceName, localPort, targetPort) followed by naive .split(" ") parsing. This allows an attacker to inject arbitrary kubectl flags by embedding spaces in any of these fields.

References

  • github.com/Flux159/mcp-server-kubernetes
  • github.com/Flux159/mcp-server-kubernetes/releases/tag/v3.5.0
  • github.com/Flux159/mcp-server-kubernetes/security/advisories/GHSA-4xqg-gf5c-ghwq
  • github.com/advisories/GHSA-4xqg-gf5c-ghwq
  • nvd.nist.gov/vuln/detail/CVE-2026-39884

Code Behaviors & Features

Detect and mitigate CVE-2026-39884 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.5.0

Fixed versions

  • 3.5.0

Solution

Upgrade to version 3.5.0 or above.

Impact 8.3 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Source file

npm/mcp-server-kubernetes/CVE-2026-39884.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:03 +0000.