Back to list

Kubetail has a Cross-Site WebSocket Hijacking issue that allows attacker to read Kubernetes logs from authenticated users — CVE-2026-44514

GHSA · GitHub · CVE-2026-44514

ID
CVE-2026-44514
Date
Updated
Activity
Source
GHSA
Vendor
GitHub
Threat
medium
CVSS
6.5

Summary

### Summary Kubetail's dashboard exposes WebSocket endpoints that did not adequately validate the Origin header on connection upgrade. A malicious web page visited by a user with an active Kubetail session could open a WebSocket to the user's dashboard and read their Kubernetes logs in real time. This is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability and affects both the desktop deployment (default…

Product

go: github.com/kubetail-org/kubetail/modules/dashboard | go: github.com/kubetail-org/kubetail/modules/cli

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories