Rancher local-path-provisioner Vulnerable to HelperPod Template Injection (CVE-2026-44543)
A malicious user with permission to edit the `local-path-config` ConfigMap in the `local-path-storage` namespace can manipulate the `helperPod.yaml` template used by `rancher/local-path-provisioner`. Security-sensitive fields such as `securityContext.privileged`, `hostPath` volumes, and Linux capabilities can be injected into the template, leading to a privileged pod running on the target node with the host root filesystem mounted.
The Rancher local-path-provisioner is vulnerable to a HelperPod template injection. A malicious user with the ability to modify the local-path-config ConfigMap in the local-path-storage namespace can manipulate the helperPod.yaml template. This template is used by the provisioner to create HelperPods during PersistentVolumeClaim (PVC) provisioning and cleanup. The vulnerability stems from insufficient validation of the helperPod.yaml template, which allows the injection of security-sensitive fields like securityContext.privileged, hostPath volumes, and Linux capabilities. Successfully exploiting this vulnerability can result in a privileged pod running on the target node with the host root filesystem mounted. Patched versions of local-path-provisioner include releases v0.0.34 and later. This issue is identified as CVE-2026-44543.
Attack Chain
- Attacker gains access to the Kubernetes cluster.
- Attacker obtains permission to edit the
local-path-configConfigMap within thelocal-path-storagenamespace. - Attacker modifies the
helperPod.yamltemplate within thelocal-path-configConfigMap to inject malicious configurations, such as settingsecurityContext.privilegedtotrueor adding ahostPathvolume mount. - Attacker triggers a PVC provisioning or cleanup operation, causing the
local-path-provisionerto load the modifiedhelperPod.yamltemplate. - The
local-path-provisionercreates a HelperPod based on the attacker-controlled template. - The malicious HelperPod is deployed on a node within the cluster, inheriting the injected privileges, such as privileged access or a host root filesystem mount.
- The attacker leverages the privileged HelperPod to access sensitive host files, read ServiceAccount tokens, or modify files on the host node.
- The attacker escalates privileges and potentially compromises the entire node or cluster.
Impact
Successful exploitation allows attackers to gain unauthorized access to sensitive host files, including ServiceAccount tokens from other pods residing on the same node. Attackers can also access other tenants’ local-path volume data, potentially leading to data breaches and further lateral movement within the cluster. Modification of files on the host node can disrupt services and compromise the integrity of the system. The vulnerability, CVE-2026-44543, presents a significant risk to Kubernetes environments utilizing the Rancher local-path-provisioner.
Recommendation
- Upgrade to
local-path-provisionerversion v0.0.34 or later to incorporate the fix that validates the HelperPod template, mitigating the risk of injecting malicious configurations (reference: Patches section). - Restrict write access to the
local-path-configConfigMap in thelocal-path-storagenamespace, ensuring that only trusted administrators can modify this ConfigMap (reference: Workarounds section). - Mark the ConfigMap as immutable after deployment to prevent unauthorized modifications (reference: Workarounds section and example
kubectlcommand). - Enable Kubernetes Pod Security Admission (PSA) for the
local-path-storagenamespace, enforcing a security policy likebaselineto prevent privileged HelperPods from being created, even if the template is altered (reference: Workarounds section and examplekubectlcommand). - Monitor Kubernetes audit logs for modifications to the
local-path-configConfigMap in thelocal-path-storagenamespace, alerting on unexpected changes.
Detection coverage 2
Detect Malicious HelperPod Template Modifications - Privileged Container
highDetects CVE-2026-44543 exploitation — modification of the local-path-config ConfigMap to inject a privileged container definition.
Detect Malicious HelperPod Template Modifications - HostPath Mount
highDetects CVE-2026-44543 exploitation — detects modification of the `local-path-config` ConfigMap to inject a `hostPath` volume mount.
Detection queries are available on the platform. Get full rules →