CVE-2025-59360
Published: 15 September 2025
Summary
CVE-2025-59360 is a critical-severity OS Command Injection (CWE-78) vulnerability in Chaos-Mesh Chaos Mesh. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Container CLI/API (T1059.013); ranked in the top 16.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents OS command injection (CWE-78) by requiring validation and sanitization of inputs to the vulnerable killProcesses mutation.
SI-2 mandates timely remediation of identified flaws, such as applying the Chaos Mesh PR #4702 patch for this command injection vulnerability.
SC-7 enforces boundary protection to restrict unauthenticated in-cluster network access needed to reach and exploit the Chaos Controller Manager.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection via Chaos Controller Manager GraphQL mutation enables unauthenticated in-cluster attackers to execute arbitrary commands on any pod, facilitating container CLI/API abuse, exploitation for privilege escalation and remote services, container administration commands, and stealing service account tokens from Container API.
NVD Description
The killProcesses mutation in Chaos Controller Manager is vulnerable to OS command injection. In conjunction with CVE-2025-59358, this allows unauthenticated in-cluster attackers to perform remote code execution across the cluster.
Deeper analysisAI
CVE-2025-59360 is an OS command injection vulnerability (CWE-78) in the killProcesses mutation of the Chaos Controller Manager within Chaos Mesh. This flaw affects deployments of Chaos Mesh, a Kubernetes-native chaos engineering platform, and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for high-impact compromise without privileges or user interaction.
Unauthenticated attackers with in-cluster network access can exploit this vulnerability. When chained with CVE-2025-59358, it enables remote code execution across the Kubernetes cluster, allowing arbitrary command execution on affected nodes.
Mitigation is addressed in Chaos Mesh pull request #4702 on GitHub, which patches the command injection issue. Further analysis of the vulnerability chain and its path to cluster takeover is detailed in the JFrog security advisory blog post.
Details
- CWE(s)