Back to CVE risk briefs

External risk intelligence

Kubectl MCP Server could allow attackers to gain system control via user interaction

The Open Source Kubectl MCP Server could allow an attacker to execute code on a system when a user interacts with a crafted web page. This could expose admin access and cause operational disruption to your infrastructure.

NVD published May 12, 2026 (3 days ago)

External risk briefCRITICAL

CVE-2025-65719

Halo Surface Signal

1/ 5

The vulnerability is client-side and requires specific user interaction with a crafted web page, typically occurring on an engineer's local workstation or internal environment rather than being a public-facing network service.

Exposure facts

H – Horizon Alert

A security vulnerability has been identified in the Open Source Kubectl MCP Server that may pose a risk to system integrity. This issue allows unauthorized individuals to execute arbitrary code on a victim’s system when a user interacts with a specially crafted HTML page. Consequently, this flaw could enable attackers to gain control over affected systems, potentially resulting in unauthorized access or operational disruption.

A – Asset Exposure

The Open Source Kubectl MCP Server is impacted by a vulnerability that may allow unauthorized code execution when a user interacts with a specially crafted HTML page. This situation could expose the operational systems and admin access connected to your infrastructure. Since this risk depends on specific user interaction, it is typically relevant to workstations or environments where users access external web content while utilizing this tool.

L – Live Threat

We are monitoring a vulnerability in the Kubectl MCP Server that could potentially allow unauthorized code execution if a user interacts with a crafted HTML page. Currently, the available context does not indicate active exploitation or known, widespread targeting of this issue. We have found no evidence of public exploit code or malicious proof-of-concept activity at this time. We will continue to assess the situation as new intelligence becomes available.

O – Operational Fix

We recommend immediately identifying all instances of the Kubectl MCP Server within your environment to assess potential exposure. Please monitor the official project repository for security updates, as applying vendor-provided patches is the primary method for remediation. Until an authorized fix is implemented, we advise limiting access to these servers and ensuring staff exercise caution when interacting with untrusted or suspicious web content.

References