Tracked as CVE-2026-3864, the flaw carries a CVSS v3.1 score of 6.5, indicating medium severity. It was identified by SentinelOne researcher Shaul Ben Hai and affects all versions of the Kubernetes NFS CSI driver before v4.13.1.
The vulnerability stems from improper input validation in the handling of the “subDir” parameter within volume identifiers.
In Kubernetes environments, this parameter specifies the subdirectory on the NFS server where a volume should be mounted.
In affected versions, the CSI driver fails to properly sanitize user-supplied input. This oversight allows attackers to inject path traversal sequences such as “../” into the volume identifier.
As a result, the driver may interpret malicious paths as legitimate during storage operations.
The issue becomes particularly dangerous during routine lifecycle events such as volume deletion. When the driver attempts to remove directories, it may follow the manipulated path and operate outside the intended storage location.
To successfully exploit this flaw, an attacker must already have permissions to create PersistentVolumes that use the NFS CSI driver.
While this requirement limits exposure, it does not eliminate risk, especially in multi-tenant or misconfigured environments.
Once these privileges are obtained, an attacker can craft malicious volume identifiers containing traversal sequences.
This allows them to:
Importantly, the impact extends beyond the Kubernetes cluster itself, directly affecting the underlying NFS infrastructure and potentially multiple applications relying on shared storage.
Security teams should immediately audit their environments for signs of exploitation. Key steps include:
Such indicators may signal attempts to manipulate or delete unintended directories.
The primary mitigation is to upgrade the Kubernetes NFS CSI driver to version 4.13.1 or later, which includes proper validation to block path traversal attempts.
Until patching is complete, organizations should:
This vulnerability highlights the broader risk of insufficient input validation in storage components. As Kubernetes adoption continues to grow, securing storage interfaces remains essential to protecting both cluster workloads and backend infrastructure.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Kubernetes CSI Driver for NFS Flaw Allows Attackers to Modify or Delete Server Data appeared first on Cyber Security News.
Crimson Desert has now sold 5 million copies, marking a significant milestone less than a…
Starfield has seen “lukewarm” sales on PlayStation 5, according to one analyst, who is now…
April 14, 2026 A redevelopment announced more than three years ago on the east end…
For years, quantum risk was easy for most institutions to treat as premature: real in…
March 2026 Highlights 129 premium XYZ Registry domains were registered* Most popular TLDs in premium…
Harrington Moving and Storage pinpointed six prime locations across New Jersey where retirees can settle.…
This website uses cookies.