Cyber Posture

CVE-2026-24005

LowPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 0.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
EPSS Score 0.0005 16.5th percentile
Risk Priority 0 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24005 is a uncategorised-severity SSRF (CWE-918) vulnerability in Openkruise Kruise. Its CVSS base score is 0.0.

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Service Discovery (T1046); ranked at the 16.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Service Discovery (T1046).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-918

Penetration testing attempts server-side requests to internal resources, identifying SSRF weaknesses for remediation.

addresses: CWE-918

Outbound connections to external resources can be monitored and limited at the boundary, reducing SSRF impact.

addresses: CWE-918

Validates server-side URLs and resource references to block SSRF attempts.

addresses: CWE-918

Detects server-side request forgery through monitoring of unexpected outbound connections.

MITRE ATT&CK Enterprise TechniquesAI

T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Why these techniques?

SSRF in PodProbeMarker enables arbitrary Host probes from node network namespace, directly facilitating port scanning and network service discovery on the node and reachable networks.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Kruise provides automated management of large-scale applications on Kubernetes. Prior to versions 1.8.3 and 1.7.5, PodProbeMarker allows defining custom probes with TCPSocket or HTTPGet handlers. The webhook validation does not restrict the Host field in these probe configurations. Since kruise-daemon…

more

runs with hostNetwork=true, it executes probes from the node network namespace. An attacker with PodProbeMarker creation permission can specify arbitrary Host values to trigger SSRF from the node, perform port scanning, and receive response feedback through NodePodProbe status messages. Versions 1.8.3 and 1.7.5 patch the issue.

Deeper analysisAI

CVE-2026-24005 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, in OpenKruise (Kruise), an automated management tool for large-scale applications on Kubernetes. It affects versions prior to 1.8.3 and 1.7.5, specifically in the PodProbeMarker feature that allows defining custom probes with TCPSocket or HTTPGet handlers. The webhook validation does not restrict the Host field in these probe configurations. The kruise-daemon component runs with hostNetwork=true, executing probes from the node's network namespace. The vulnerability has a CVSS v3.1 base score of 0.0 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N).

An attacker with permission to create PodProbeMarker resources can exploit this by specifying arbitrary Host values in probe configurations. This triggers SSRF requests originating from the Kubernetes node itself, enabling port scanning on the node or other networks accessible to it. Attackers can receive feedback on probe success or failure through NodePodProbe status messages.

Kruise versions 1.8.3 and 1.7.5 address the issue with a patch that restricts the Host field in webhook validation. Security practitioners should upgrade to these versions. Additional details are available in the GitHub security advisory (GHSA-9fj4-3849-rv9g), the fixing commit (94364b76adf3e8a1749a31afe809a163bed29613), and release notes for v1.7.5 and v1.8.3.

Details

CWE(s)

Affected Products

openkruise
kruise
≤ 1.7.5 · 1.8.0 — 1.8.3

CVEs Like This One

CVE-2025-71258Shared CWE-918
CVE-2026-0686Shared CWE-918
CVE-2025-1849Shared CWE-918
CVE-2025-1848Shared CWE-918
CVE-2026-4528Shared CWE-918
CVE-2025-27777Shared CWE-918
CVE-2026-40242Shared CWE-918
CVE-2026-25991Shared CWE-918
CVE-2026-43526Shared CWE-918
CVE-2026-5418Shared CWE-918

References