<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Manifold Security — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/manifold-security/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 20:34:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/manifold-security/feed.xml" rel="self" type="application/rss+xml"/><item><title>MCP Server Kubernetes Tool Access Control Bypass (CVE-2026-46519)</title><link>https://feed.craftedsignal.io/briefs/2026-05-mcp-server-bypass/</link><pubDate>Thu, 21 May 2026 20:34:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mcp-server-bypass/</guid><description>MCP Server Kubernetes versions before 3.6.0 have an access control bypass vulnerability (CVE-2026-46519) where tool access controls are enforced only at the discovery layer, allowing authenticated clients to invoke any Kubernetes tool regardless of configured restrictions, potentially leading to cluster compromise.</description><content:encoded><![CDATA[<p>MCP Server Kubernetes is vulnerable to an access control bypass that allows authenticated users to execute any Kubernetes tool regardless of the configured restriction mode. The vulnerability lies in the <code>tools/call</code> endpoint, which doesn&rsquo;t enforce the same filtering logic as the <code>tools/list</code> endpoint. This means an attacker with network access to the MCP server, even with limited permissions (e.g., <code>kubectl_get</code>), can invoke more sensitive tools like <code>kubectl_delete</code>, <code>exec_in_pod</code>, <code>kubectl_generic</code>, and <code>node_management</code>. The issue was present in versions prior to v3.6.0. This bypass is particularly dangerous in multi-client HTTP deployment scenarios, where operators rely on tool restrictions to enforce least-privilege access. Exploitation of this vulnerability can lead to full cluster compromise if the MCP server runs with <code>cluster-admin</code> privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the MCP server&rsquo;s HTTP endpoint.</li>
<li>Attacker authenticates to the MCP server using a valid <code>MCP_AUTH_TOKEN</code> or <code>X-MCP-AUTH</code> header.</li>
<li>Attacker discovers available tools via the <code>tools/list</code> endpoint. The returned list may be restricted based on configured environment variables.</li>
<li>Attacker crafts a <code>tools/call</code> request with the name of a restricted tool (e.g., <code>kubectl_delete</code>).</li>
<li>Attacker includes the necessary arguments for the chosen tool in the <code>params</code> field of the request.</li>
<li>Attacker sends the crafted <code>tools/call</code> request to the MCP server&rsquo;s HTTP endpoint.</li>
<li>The MCP server executes the requested tool without validating if the authenticated user has permission to use it.</li>
<li>The attacker achieves the intended malicious action (e.g., deleting a pod).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker or misconfigured AI agent to bypass intended access controls and execute arbitrary Kubernetes commands. The impact scales with the permissions of the Kubernetes service account used by the MCP server. In environments where the MCP server runs with <code>cluster-admin</code> privileges, this can lead to full cluster compromise, including unauthorized data access, modification, and deletion. This vulnerability affected users relying on tool restriction environment variables to enforce least-privilege access, potentially leading to privilege escalation and unauthorized actions within the Kubernetes cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>mcp-server-kubernetes</code> version 3.6.0 or later to remediate CVE-2026-46519.</li>
<li>Monitor HTTP requests to the <code>/mcp</code> endpoint for <code>tools/call</code> methods attempting to invoke sensitive Kubernetes tools like <code>kubectl_delete</code>, <code>exec_in_pod</code>, <code>kubectl_generic</code>, and <code>node_management</code> (see example Sigma rule below).</li>
<li>Review and restrict the permissions of the Kubernetes service account used by the MCP server to adhere to the principle of least privilege.</li>
<li>Implement network segmentation to limit access to the MCP server&rsquo;s HTTP endpoint only to authorized clients.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>access-control-bypass</category><category>privilege-escalation</category><category>kubernetes</category><category>cloud</category></item></channel></rss>