VYPR
Medium severityGHSA Advisory· Published May 8, 2026

Volcano's webhook server vulnerable to OOM due to unbounded HTTP request body size

CVE-2026-44247

Description

Impact

The Volcano webhook server does not enforce a size limit on incoming HTTP request bodies. Any in-cluster pod that can reach the webhook endpoint may send an arbitrarily large request body, potentially causing the webhook server to be killed by OOM. All Volcano deployments with the webhook server exposed to in-cluster traffic are affected.

Patches

This issue will be fixed in the following versions: - v1.14.2 - v1.13.3 - v1.12.4

Users running versions below these should upgrade accordingly.

Workarounds

No known workarounds. Upgrade to the patched versions listed above.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Volcano webhook server lacks input size limits, allowing OOM kill by any in-cluster pod.

Root

Cause

The Volcano webhook server does not enforce a size limit on incoming HTTP request bodies [2]. This allows any in-cluster pod that can reach the webhook endpoint to send an arbitrarily large request body. The underlying issue is the absence of a configured request body size limit in the HTTP server handling webhook admissions. By sending a sufficiently large payload, an attacker can cause the webhook server to run out of memory (OOM) and be killed by the operating system.

Exploitation

Prerequisites

Exploitation requires an already-compromised pod or a malicious workload running inside the Kubernetes cluster that can network that has network access to the webhook service endpoint [2]. No authentication is needed beyond having a pod that can make HTTP requests to the webhook server. This applies to all Volcano deployments where the webhook server is exposed to in-cluster traffic.

Impact

Successful exploitation results in a denial-of-service (DoS) condition against the webhook server. The OOM kill removes the webhook from the cluster, preventing admission control from processing any further requests. This could delay or block the scheduling of new Volcano workloads and potentially impact other cluster operations that depend on webhook validation [2].

Mitigation

Volcano has released patched versions that fix this issue: v1.14.2, v1.13.3, and v1.12.4 [2]. Users running versions below these should upgrade immediately. No known workarounds exist other than upgrading to a fixed version.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
volcano.sh/volcanoGo
< 1.12.41.12.4
volcano.sh/volcanoGo
>= 1.13.0, < 1.13.31.13.3
volcano.sh/volcanoGo
>= 1.14.0, < 1.14.21.14.2

Affected products

2
  • Volcano Sh/VolcanoGHSA2 versions
    >= 1.14.0, < 1.14.2+ 1 more
    • (no CPE)range: >= 1.14.0, < 1.14.2
    • (no CPE)range: <= v1.14.1, <= v1.13.2, <= v1.12.3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.