CVE-2026-26055 PUBLISHED

Unauthenticated Admission Webhook Endpoints in Yoke ATC

Assigner: GitHub_M
Reserved: 10.02.2026 Published: 12.02.2026 Updated: 12.02.2026

Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS Score: 7.5

Product Status

Vendor yokecd
Product yoke
Versions
  • Version <= 0.19.0 is affected

References

Problem Types

  • CWE-306: Missing Authentication for Critical Function CWE