<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Helm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/helm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/helm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Helm Plugin Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-helm-path-traversal/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-helm-path-traversal/</guid><description>A path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.</description><content:encoded><![CDATA[<p>Helm, a package manager for Kubernetes charts, is vulnerable to a path traversal issue. Specifically, Helm versions 4.0.0 through 4.1.3 are affected. A maliciously crafted Helm plugin, when installed or updated, can exploit this vulnerability (CVE-2026-35204) to write the plugin&rsquo;s contents to arbitrary locations on the user&rsquo;s filesystem. This can lead to overwriting critical system files or user data, potentially compromising the system&rsquo;s integrity. Helm v4.1.4 resolves this vulnerability by rejecting plugins with non-SemVer versions containing path traversal patterns. Defenders should ensure Helm installations are updated to the patched version or implement workarounds to validate plugin metadata.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Helm plugin. This plugin contains a <code>plugin.yaml</code> file with a <code>version</code> field that includes POSIX dot-dot path separators (e.g., <code>/../</code>).</li>
<li>The attacker distributes the malicious plugin to potential victims, possibly through public repositories or direct spear phishing.</li>
<li>A victim attempts to install or update the Helm plugin using the <code>helm plugin install</code> or <code>helm plugin update</code> command.</li>
<li>Helm parses the <code>plugin.yaml</code> file and extracts the <code>version</code> field, which contains the path traversal characters.</li>
<li>Due to the vulnerability, Helm incorrectly resolves the file path, allowing the plugin&rsquo;s contents to be written outside the intended plugin directory.</li>
<li>The malicious plugin overwrites arbitrary files on the user&rsquo;s system based on the path specified in the <code>version</code> field.</li>
<li>Depending on the files overwritten, the attacker can achieve various malicious objectives, such as gaining persistence, escalating privileges, or executing arbitrary code.</li>
<li>The attacker achieves persistence by overwriting system startup scripts or configuration files, allowing the malicious code to run automatically on system reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to overwrite arbitrary files on the victim&rsquo;s system. This can lead to various detrimental outcomes, including data loss, system instability, privilege escalation, and ultimately, complete system compromise. While the specific number of victims is unknown, any user running a vulnerable version of Helm (4.0.0 - 4.1.3) is at risk. The potential impact includes compromising Kubernetes deployments and sensitive data stored on affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Helm to version 4.1.4 or later to remediate CVE-2026-35204, as this version includes a patch that prevents path traversal during plugin installation.</li>
<li>Implement a validation step before installing or updating Helm plugins, checking the <code>plugin.yaml</code> file for a <code>version:</code> field containing POSIX dot-dot path separators. This mitigates the risk described in the workaround section of the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Helm Plugin Install with Path Traversal&rdquo; to detect attempts to install plugins with malicious <code>version</code> fields, using file_event logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>helm</category><category>path-traversal</category><category>vulnerability</category><category>plugin</category><category>kubernetes</category></item></channel></rss>