Skip to main content
Mallory

Path Traversal in Kubernetes CSI Driver for NFS

cloud-service-vulnerabilityopen-source-dependency-vulnerabilitywidely-deployed-product-advisory
Updated March 21, 2026 at 05:47 AM2 sources
Share:
Path Traversal in Kubernetes CSI Driver for NFS

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A path traversal vulnerability in the Kubernetes CSI Driver for NFS (nfs.csi.k8s.io) could allow attackers with permission to create PersistentVolume objects to supply crafted volumeHandle values containing ../ sequences in the subDir field. During deletion or cleanup operations, the driver may traverse outside the intended managed path and delete or modify unintended directories on the backing NFS server. The issue is tracked as CVE-2026-3864 and carries a CVSS 6.5 rating, with impact focused on integrity and availability rather than confidentiality.

Affected deployments are those running CSI Driver for NFS versions prior to v4.13.1 while allowing non-administrative or otherwise untrusted users to create PersistentVolumes that reference the NFS CSI driver. Kubernetes guidance says organizations should upgrade to v4.13.1 or later, restrict PersistentVolume creation to trusted administrators, inspect volumeHandle values for traversal strings such as ../, and review controller logs for unexpected directory operations such as references to paths escaping the intended export directory. This is a substantive vulnerability disclosure, not promotional or generic content.

Timeline

  1. Mar 17, 2026

    Kubernetes publishes advisory for CVE-2026-3864

    A Kubernetes product advisory was published documenting CVE-2026-3864, a path traversal issue in the CSI Driver for NFS. The advisory formalized the disclosure and identified the risk of unintended directory deletion on NFS servers.

  2. Mar 17, 2026

    Kubernetes fixes CVE-2026-3864 in CSI Driver for NFS v4.13.1

    Kubernetes maintainers Andy Zhang and Rita Zhang released a fix for CVE-2026-3864 in CSI Driver for NFS version 4.13.1. The vulnerability affects versions prior to v4.13.1 and could allow users able to create PersistentVolumes for nfs.csi.k8s.io to delete or modify unintended directories on the NFS server via ../ traversal sequences.

  3. Mar 17, 2026

    SentinelOne researcher discovers and responsibly discloses NFS CSI path traversal flaw

    Shaul Ben Hai of SentinelOne identified a path traversal vulnerability in the Kubernetes CSI Driver for NFS involving insufficient validation of the subDir parameter in volume identifiers. The issue was responsibly disclosed to the Kubernetes project and handled with the Kubernetes Security Response Committee.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Organizations

Related Stories

Mount Option Injection Flaw in Amazon EFS CSI Driver

Mount Option Injection Flaw in Amazon EFS CSI Driver

AWS disclosed **CVE-2026-6437**, a mount option injection vulnerability in the Amazon EFS CSI Driver that stems from insufficient input validation before user-controlled values are passed to the operating system's mount helper. In affected versions prior to `3.0.1`, Kubernetes `PersistentVolume` attributes including `mounttargetip` and `volumeHandle` can be crafted with injected comma-separated values that the Linux mount process interprets as additional mount options. Because the driver builds the mount option string directly from those fields and executes with elevated privileges on Kubernetes nodes, an attacker could cause unauthorized mount flags to be applied to the target EFS filesystem during the CSI driver's mount operation. The flaw affects environments using vulnerable EFS CSI Driver releases, and the reported remediation is to upgrade to version `3.0.1` or later.

1 weeks ago
Critical ingress-nginx flaws enable NGINX config injection, RCE, and admission-controller DoS

Critical ingress-nginx flaws enable NGINX config injection, RCE, and admission-controller DoS

Kubernetes maintainers disclosed multiple vulnerabilities in **ingress-nginx** affecting versions `< 1.13.7` and `< 1.14.3`, including **NGINX configuration injection** paths that can lead to **arbitrary code execution** in the ingress-nginx controller context and **Secrets disclosure**. **CVE-2026-24512** allows injection via the Ingress `rules.http.paths.path` field, and **CVE-2026-1580** allows injection via the `nginx.ingress.kubernetes.io/auth-method` annotation; both are rated **CVSS 8.8** and are especially high impact in default deployments where the controller can read Secrets cluster-wide. Recommended mitigations include upgrading to **v1.13.7**, **v1.14.3**, or later, and (as a temporary control) using validating admission policies to reject risky constructs such as `ImplementationSpecific` path types or the `auth-method` annotation. A separate ingress-nginx issue, **CVE-2026-24514** (CVSS 6.5), affects the validating admission controller feature and enables **denial of service** by sending oversized requests that drive memory consumption, potentially killing the controller pod or exhausting node memory. Detection guidance includes monitoring for unusually large requests (multi-megabyte) to the admission controller and suspicious payloads in `rules.http.paths.path` or the `nginx.ingress.kubernetes.io/auth-method` annotation. One referenced item describing **CVE-2025-67601** in the *Rancher CLI* (credential/TLS handling weakness involving `--skip-verify`) is a different product and vulnerability and is not part of the ingress-nginx disclosures.

1 months ago
Critical Root Access and Arbitrary File Write Flaws Disclosed in Network-Exposed Systems

Critical Root Access and Arbitrary File Write Flaws Disclosed in Network-Exposed Systems

Two high-severity vulnerabilities were disclosed affecting exposed application and device management surfaces, including a flaw that can give attackers **root access** and another that enables **arbitrary file write** through path traversal. **CVE-2026-3587** describes an unauthenticated remote attack path in a hidden CLI function that lets an attacker escape a restricted prompt and gain root access to the underlying Linux operating system, potentially leading to full device compromise. The issue was mapped to `CWE-912` and assigned a `CVSS v3.1` score vector of `AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`, with CERT VDE publishing advisory `VDE-2026-020`. A separate vulnerability, **CVE-2026-5027**, affects Langflow's `POST /api/v2/files` endpoint, where improper sanitization of the multipart `filename` parameter allows path traversal using `../` sequences. An authenticated attacker can exploit the bug to write files to arbitrary filesystem locations, creating a route to compromise confidentiality, integrity, and availability. The flaw was classified as `CWE-22`, carries the `CVSS v3.1` vector `AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`, and is referenced in Tenable advisory `TRA-2026-26`.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Path Traversal in Kubernetes CSI Driver for NFS | Mallory