CVE-2026-42457

vCluster · vCluster Platform

A stored Cross-Site Scripting (XSS) vulnerability in the vCluster Platform allows attackers to execute arbitrary scripts and potentially escalate privileges.

Executive summary

A critical XSS vulnerability in the vCluster Platform allows an attacker to execute arbitrary scripts and potentially escalate to Global-Admin privileges.

Vulnerability

The platform fails to sanitize the name field of a templateRef, allowing an attacker with namespace creation permissions to inject malicious scripts that execute in the browser context of other users.

Business impact

This flaw can be leveraged to compromise administrative sessions, potentially leading to the creation of new Global-Admin users. With a CVSS score of 9.0, this represents a major threat to the multi-tenant security architecture of the Kubernetes platform.

Remediation

Immediate Action: Upgrade the vCluster Platform to the versions listed in the advisory (4.4.3, 4.5.5, 4.6.2, 4.7.1, or 4.8.0).

Proactive Monitoring: Audit platform logs for suspicious activity within the template management UI and monitor for unauthorized creation of administrative accounts.

Compensating Controls: Implement strict RBAC policies to limit the number of users with namespace creation privileges until the platform can be patched.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The potential for privilege escalation makes this a high-priority update. Platform administrators must apply the security patches immediately to maintain the integrity of their multi-tenancy environment.