Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover

Posted on September 16, 2025September 16, 2025 By CWS

Sep 16, 2025Ravie LakshmananVulnerability / Cloud Safety
Cybersecurity researchers have disclosed a number of important safety vulnerabilities in Chaos Mesh that, if efficiently exploited, may result in cluster takeover in Kubernetes environments.
“Attackers want solely minimal in-cluster community entry to use these vulnerabilities, execute the platform’s fault injections (equivalent to shutting down pods or disrupting community communications), and carry out additional malicious actions, together with stealing privileged service account tokens,” JFrog mentioned in a report shared with The Hacker Information.
Chaos Mesh is an open-source cloud-native Chaos Engineering platform that gives varied kinds of fault simulation and simulates varied abnormalities that may happen throughout the software program improvement lifecycle.

The problems, collectively referred to as Chaotic Deputy, are listed under –

CVE-2025-59358 (CVSS rating: 7.5) – The Chaos Controller Supervisor in Chaos Mesh exposes a GraphQL debugging server with out authentication to your complete Kubernetes cluster, which gives an API to kill arbitrary processes in any Kubernetes pod, resulting in cluster-wide denial-of-service
CVE-2025-59359 (CVSS rating: 9.8) – The cleanTcs mutation in Chaos Controller Supervisor is susceptible to working system command injection
CVE-2025-59360 (CVSS rating: 9.8) – The killProcesses mutation in Chaos Controller Supervisor is susceptible to working system command injection
CVE-2025-59361 (CVSS rating: 9.8) – The cleanIptables mutation in Chaos Controller Supervisor is susceptible to working system command injection

An in-cluster attacker, i.e., a menace actor with preliminary entry to the cluster’s community, may chain CVE-2025-59359, CVE-2025-59360, CVE-2025-59361, or with CVE-2025-59358 to carry out distant code execution throughout the cluster, even within the default configuration of Chaos Mesh.
JFrog mentioned the vulnerabilities stem from inadequate authentication mechanisms inside the Chaos Controller Supervisor’s GraphQL server, permitting unauthenticated attackers to run arbitrary instructions on the Chaos Daemon, leading to cluster takeover.

Risk actors may then leverage the entry to doubtlessly exfiltrate delicate information, disrupt important providers, and even transfer laterally throughout the cluster to escalate privileges.
Following accountable disclosure on Might 6, 2025, all of the recognized shortcomings have been addressed by Chaos Mesh with the discharge of model 2.7.3 on August 21.
Customers are suggested to replace their installations to the most recent model as quickly as doable. If instant patching shouldn’t be an possibility, it is advisable to limit community visitors to the Chaos Mesh daemon and API server, and keep away from working Chaos Mesh in open or loosely secured environments.

The Hacker News Tags:Chaos, Cluster, Critical, Enable, Flaws, Full, GraphQL, Kubernetes, Mesh, RCE, Takeover

Post navigation

Previous Post: Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace
Next Post: Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores

Related Posts

MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware The Hacker News
Privacy in the Age of Agentic AI The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms The Hacker News
Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More The Hacker News
Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection The Hacker News
Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Check Point to Acquire AI Security Firm Lakera
  • OpenSSL Conference 2025
  • Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores
  • Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
  • Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Check Point to Acquire AI Security Firm Lakera
  • OpenSSL Conference 2025
  • Hackers stole millions of Users’ Personal Data from Gucci, Balenciaga, and Alexander McQueen Stores
  • Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover
  • Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News