mcp-kubernetes-server has an OS Command Injection vulnerability
        
  Critical severity
        
          GitHub Reviewed
      
        Published
          Sep 15, 2025 
          to the GitHub Advisory Database
          •
          Updated Sep 25, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Sep 15, 2025 
    
  
        Published to the GitHub Advisory Database
      Sep 15, 2025 
    
  
        Reviewed
      Sep 15, 2025 
    
  
        Last updated
      Sep 25, 2025 
    
  
feiskyer/mcp-kubernetes-serverthrough 0.1.11 allows OS command injection via the/mcp/kubectlendpoint. The handler constructs a shell command with user-supplied arguments and executes it withsubprocessusingshell=True, enabling injection through shell metacharacters (e.g.,;,&&,$()), even when the server is running in read-only mode.A remote, unauthenticated attacker can execute arbitrary OS commands on the host, resulting in full compromise of confidentiality, integrity, and availability.
This issue is distinct from
mcp-server-kubernetesand from CVE-2025-53355.References