Helm Plugin Path Traversal Vulnerability
A path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.
Helm, a package manager for Kubernetes charts, is vulnerable to a path traversal issue. Specifically, Helm versions 4.0.0 through 4.1.3 are affected. A maliciously crafted Helm plugin, when installed or updated, can exploit this vulnerability (CVE-2026-35204) to write the plugin’s contents to arbitrary locations on the user’s filesystem. This can lead to overwriting critical system files or user data, potentially compromising the system’s integrity. Helm v4.1.4 resolves this vulnerability by rejecting plugins with non-SemVer versions containing path traversal patterns. Defenders should ensure Helm installations are updated to the patched version or implement workarounds to validate plugin metadata.
Attack Chain
- An attacker crafts a malicious Helm plugin. This plugin contains a
plugin.yamlfile with aversionfield that includes POSIX dot-dot path separators (e.g.,/../). - The attacker distributes the malicious plugin to potential victims, possibly through public repositories or direct spear phishing.
- A victim attempts to install or update the Helm plugin using the
helm plugin installorhelm plugin updatecommand. - Helm parses the
plugin.yamlfile and extracts theversionfield, which contains the path traversal characters. - Due to the vulnerability, Helm incorrectly resolves the file path, allowing the plugin’s contents to be written outside the intended plugin directory.
- The malicious plugin overwrites arbitrary files on the user’s system based on the path specified in the
versionfield. - Depending on the files overwritten, the attacker can achieve various malicious objectives, such as gaining persistence, escalating privileges, or executing arbitrary code.
- The attacker achieves persistence by overwriting system startup scripts or configuration files, allowing the malicious code to run automatically on system reboot.
Impact
Successful exploitation of this vulnerability allows attackers to overwrite arbitrary files on the victim’s system. This can lead to various detrimental outcomes, including data loss, system instability, privilege escalation, and ultimately, complete system compromise. While the specific number of victims is unknown, any user running a vulnerable version of Helm (4.0.0 - 4.1.3) is at risk. The potential impact includes compromising Kubernetes deployments and sensitive data stored on affected systems.
Recommendation
- Upgrade Helm to version 4.1.4 or later to remediate CVE-2026-35204, as this version includes a patch that prevents path traversal during plugin installation.
- Implement a validation step before installing or updating Helm plugins, checking the
plugin.yamlfile for aversion:field containing POSIX dot-dot path separators. This mitigates the risk described in the workaround section of the advisory. - Deploy the Sigma rule “Helm Plugin Install with Path Traversal” to detect attempts to install plugins with malicious
versionfields, using file_event logs.
Detection coverage 2
Helm Plugin Install with Path Traversal
highDetects Helm plugin installations where the plugin.yaml contains path traversal sequences in the version field.
Suspicious Helm Plugin Update with Path Traversal
highDetects Helm plugin updates where the plugin.yaml contains path traversal sequences in the version field.
Detection queries are kept inside the platform. Get full rules →