
Cloud Vulnerability DB
A community-led vulnerabilities database
The Chaos Controller Manager in Chaos Mesh contains a critical vulnerability (CVE-2025-59358) discovered in September 2025. This vulnerability exposes a GraphQL debugging server without authentication to the entire Kubernetes cluster, which provides an API to kill arbitrary processes in any Kubernetes pod. The vulnerability affects Chaos Mesh versions prior to 2.7.3 and has been assigned a CVSS score of 7.5 (High) (JFrog Blog, NVD).
The vulnerability stems from a debugging tool that is activated by default on the Controller, exposing an unauthenticated GraphQL server. The '/query' endpoint lacks authentication enforcement, allowing any attacker with cluster network access to communicate with the GraphQL server. The vulnerability is tracked as CWE-306 (Missing Authentication for Critical Function) and enables attackers to initiate fault injections across the Kubernetes cluster at will (JFrog Blog).
The vulnerability leads to cluster-wide denial of service capabilities. Attackers with in-cluster access can execute the chaos platform's native Fault Injections, including shutting down pods and interrupting network communications. This access allows attackers to perform malicious actions such as shutting down critical system pods, including the API server pod, resulting in cluster-wide service disruption (JFrog Blog, Hacker News).
Users are advised to upgrade Chaos Mesh to version 2.7.3 or later as soon as possible. If immediate upgrading is not possible, a workaround is available by re-deploying the Helm chart and disabling the chaosctl tool and port using the command: 'helm install chaos-mesh chaos-mesh/chaos-mesh -n=chaos-mesh --version 2.7.x --set enableCtrlServer=false' (JFrog Blog).
The vulnerability was responsibly disclosed to the Chaos-Mesh development team on May 6, 2025. The team responded by releasing version 2.7.3 on August 21, 2025, containing a short-term fix where the CtrlServer is not active by default. The security community has emphasized the critical nature of this vulnerability, particularly due to its potential impact on Kubernetes environments (JFrog Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."