CVSS Score: 8.8 Published: 2026-02-12 Full Report: https://cvereports.com/reports/CVE-2026-26056
A critical remote code execution vulnerability in Yoke's Air Traffic Controller (ATC) component allows attackers to execute arbitrary WebAssembly (WASM) modules via simple Kubernetes annotations. By failing to validate the origin of 'flight' overrides, Yoke inadvertently turns the cluster's management layer into a malware distribution platform.
Yoke ATC versions <= 0.19.0 blindly download and execute WASM binaries from URLs specified in Kubernetes annotations. An attacker with basic edit rights can escalate to full cluster compromise.
- CWE ID: CWE-94 (Improper Control of Generation of Code)
- Attack Vector: Network (Annotation Injection)
- CVSS: 8.8 (High)
- Risk: Critical (RCE / Privilege Escalation)
- Exploit Status: PoC Available / Trivial
- Affected Component: Yoke ATC / WASM Loader
- Yoke Air Traffic Controller (ATC)
- Kubernetes Clusters using Yoke
- Yoke: <= 0.19.0 (Fixed in:
0.19.1)
- Upgrade Yoke software components
- Implement Admission Controller policies
- Restrict network egress for controller pods
Remediation Steps:
- Pull the latest Yoke images (tag >= 0.19.1).
- Redeploy the ATC component.
- Audit existing resources for the
overrides.yoke.cd/flightannotation. - Apply Kyverno/Gatekeeper policies to block unauthorized annotations.
Generated by CVEReports - Automated Vulnerability Intelligence