Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wj8p-jj64-h7ff | Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:yokecd:yoke:*:*:*:*:*:*:*:* |
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yokecd
Yokecd yoke |
|
| Vendors & Products |
Yokecd
Yokecd yoke |
Thu, 12 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yoke is a Helm-inspired infrastructure-as-code (IaC) package deployer. In 0.19.0 and earlier, a vulnerability exists in the Air Traffic Controller (ATC) component of Yoke. It allows users with CR create/update permissions to execute arbitrary WASM code in the ATC controller context by injecting a malicious URL through the overrides.yoke.cd/flight annotation. The ATC controller downloads and executes the WASM module without proper URL validation, enabling attackers to create arbitrary Kubernetes resources or potentially escalate privileges to cluster-admin level. | |
| Title | Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-12T21:33:22.829Z
Reserved: 2026-02-10T18:01:31.899Z
Link: CVE-2026-26056
Updated: 2026-02-12T21:33:00.635Z
Status : Analyzed
Published: 2026-02-12T22:16:06.347
Modified: 2026-04-01T20:53:39.900
Link: CVE-2026-26056
No data.
OpenCVE Enrichment
Updated: 2026-04-17T20:00:09Z
Github GHSA