Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-965m-v4cc-6334 | Unauthenticated Admission Webhook Endpoints in Yoke ATC |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:yokecd:yoke:*:*:*:*:*:*:*:* |
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yokecd
Yokecd yoke |
|
| Vendors & Products |
Yokecd
Yokecd yoke |
Thu, 12 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization. | |
| Title | Unauthenticated Admission Webhook Endpoints in Yoke ATC | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-12T21:36:37.816Z
Reserved: 2026-02-10T18:01:31.899Z
Link: CVE-2026-26055
Updated: 2026-02-12T21:36:28.213Z
Status : Analyzed
Published: 2026-02-12T22:16:06.190
Modified: 2026-04-01T20:57:00.640
Link: CVE-2026-26055
No data.
OpenCVE Enrichment
Updated: 2026-04-17T20:00:09Z
Github GHSA