Skip to content

Kubetail has a Cross-Site WebSocket Hijacking issue that allows attacker to read Kubernetes logs from authenticated users

Moderate severity GitHub Reviewed Published May 1, 2026 in kubetail-org/kubetail • Updated May 7, 2026

Package

gomod github.com/kubetail-org/kubetail/modules/cli (Go)

Affected versions

< 0.16.0

Patched versions

0.16.0
gomod github.com/kubetail-org/kubetail/modules/dashboard (Go)
< 0.14.0
0.14.0

Description

Summary

Kubetail's dashboard exposes WebSocket endpoints that did not adequately validate the Origin header on connection upgrade. A malicious web page visited by a user with an active Kubetail session could open a WebSocket to the user's dashboard and read their Kubernetes logs in real time. This is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability and affects both the desktop deployment (default http://localhost:7500) and cluster deployments (typically behind an Ingress with HTTP basic auth).

Impact

An attacker who can convince an authenticated Kubetail user to visit a page they control can:

  • Establish a WebSocket connection to the victim's dashboard from the attacker's origin
  • Stream container logs the victim has access to via the Kubernetes API
  • Exfiltrate the contents to an attacker-controlled server

The attacker gains read-only access to logs — no write or destructive operations are exposed. However, container logs frequently contain credentials accidentally written by application code, bearer tokens, internal hostnames, customer PII, and other secrets, so the practical impact of read access can be significant.

The desktop deployment is particularly exposed because the dashboard is reachable at a predictable localhost URL, requires no network reachability from the attacker, and the browser will attach ambient credentials to the WebSocket handshake.
For cluster deployments fronted by HTTP basic auth, the browser's automatic re-sending of basic-auth credentials on the WebSocket upgrade request enables the same attack against the configured dashboard origin.

Affected versions

Component Name Affected Patched
Kubetail Dashboard docker image kubetail-dashboard < 0.14.0 >= 0.14.0
Kubetail Helm Chart kubetail/kubetail < 0.23.0 >= 0.23.0
Kubetail CLI kubetail < 0.16.0 >= 0.16.0

Confirmed in Google Chrome. Microsoft Edge is presumed affected as it shares Chromium's WebSocket implementation, but was not directly tested.

Preconditions for exploitation

  1. The victim has an active authenticated Kubetail session (desktop dashboard running, or browser holding valid credentials for a cluster deployment).
  2. The victim visits a web page controlled by the attacker in the same browser.
  3. The attacker knows or can guess the dashboard URL (trivial for desktop; cluster deployments require knowing the Ingress hostname).

Patches

Upgrade to:

  • Kubetail Dashboard 0.14.0 or later
  • Kubetail Helm Chart 0.23.0 or later
  • Kubetail CLI 0.16.0 or later

Workarounds

If users cannot upgrade immediately:

  • Desktop: Stop the dashboard (kubetail CLI process) when not actively in use. Avoid visiting untrusted sites in the same browser profile while the dashboard is running.
  • Cluster: Restrict Ingress access to a VPN, bastion, or office network. Add a stronger outer authentication layer (e.g. OAuth proxy) in front of basic auth. Consider browser profile isolation for cluster admins.

References

@amorey amorey published to kubetail-org/kubetail May 1, 2026
Published to the GitHub Advisory Database May 7, 2026
Reviewed May 7, 2026
Last updated May 7, 2026

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS score

Weaknesses

Missing Origin Validation in WebSockets

The product uses a WebSocket, but it does not properly verify that the source of data or communication is valid. Learn more on MITRE.

CVE ID

CVE-2026-44514

GHSA ID

GHSA-v8j7-hp7c-738f

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.