
Cloud Vulnerability DB
A community-led vulnerabilities database
The cleanTcs mutation in Chaos Controller Manager (CVE-2025-59359) is a critical severity vulnerability (CVSS 9.8) discovered in September 2025. This vulnerability affects the Chaos-Mesh platform, a Cloud Native Computing Foundation incubating project, and specifically impacts versions prior to 2.7.3. The vulnerability is part of a group of vulnerabilities collectively named 'Chaotic Deputy' (JFrog Blog).
The vulnerability is an OS command injection flaw in the cleanTcs mutation of the Chaos Controller Manager. The issue stems from user input being directly concatenated into the 'cmd' parameter which is then passed to the ExecBypass method for command execution on the desired pod. This implementation allows attackers to inject arbitrary shell commands. The vulnerability has received a CVSS v3.1 score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) (NVD).
When exploited in conjunction with CVE-2025-59358, this vulnerability allows unauthenticated in-cluster attackers to perform remote code execution across the Kubernetes cluster. Attackers can execute arbitrary commands on any pod in the cluster, potentially leading to complete cluster takeover. This includes the ability to steal privileged service account tokens and execute the platform's native Fault Injections (JFrog Blog).
Users are strongly recommended to upgrade to Chaos-Mesh version 2.7.3 or later, which contains the fix for this vulnerability. If immediate upgrading is not possible, a workaround is available by re-deploying the Helm chart with the chaosctl tool and port disabled using the command: 'helm install chaos-mesh chaos-mesh/chaos-mesh -n=chaos-mesh --version 2.7.x --set enableCtrlServer=false' (JFrog Blog).
The vulnerability was responsibly disclosed by JFrog Security Research to the Chaos-Mesh development team on May 6, 2025. The Chaos-Mesh team responded promptly by releasing version 2.7.3 on August 21, 2025, which included a short-term fix by disabling the CtrlServer by default. The vulnerability was publicly disclosed on September 15, 2025, followed by detailed technical analysis from JFrog Security Research (JFrog Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."