You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
k8sGPT has Prompt Injection through its k8sGPT-Operator
High severity
GitHub Reviewed
Published
Apr 14, 2026
in
k8sgpt-ai/k8sgpt
•
Updated Apr 24, 2026
In the auto-remediation pipeline, object_to_execution.go was deserializing the AI-generated YAML directly into a Deployment object, but there was lack of validation from the original Deployment object.
Details
This issue was fixed after coordination with Alex Jones.
PoC
To minimize the impact, the PoC of this vulnerability wasn't released, but was shared with the maintainers.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Learn more on MITRE.
The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.
Learn more on MITRE.
Summary
In the auto-remediation pipeline,
object_to_execution.gowas deserializing the AI-generated YAML directly into a Deployment object, but there was lack of validation from the original Deployment object.Details
This issue was fixed after coordination with Alex Jones.
PoC
To minimize the impact, the PoC of this vulnerability wasn't released, but was shared with the maintainers.
References