MCP Server for kubernetes management commands
{
"mcpServers": {
"kubernetes": {
"args": [
"mcp-server-kubernetes"
],
"command": "npx"
}
}
}MCP Server for kubernetes management commands
Is it safe?
No known CVEs for mcp-server-kubernetes. 2 previously resolved.
No authentication — any process on your machine can connect.
MIT. View license →
Is it maintained?
Last commit 6 days ago. 1,371 stars. 11,931 weekly downloads.
Will it work with my client?
Transport: stdio, sse, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Context cost
22 tools. ~900 tokens (0.5% of 200K). Consider loading selectively.
This server supports HTTP transport. Be the first to test it — help the community know if it works.
kubectl_getGet or list Kubernetes resources
kubectl_describeDescribe Kubernetes resources
kubectl_createCreate Kubernetes resources
kubectl_applyApply YAML manifests to Kubernetes
kubectl_deleteDelete Kubernetes resources
kubectl_logsGet logs from Kubernetes pods
kubectl_contextManage kubectl contexts
explain_resourceExplain Kubernetes resources
list_api_resourcesList available Kubernetes API resources
kubectl_scaleScale Kubernetes resources
k8s-diagnoseTroubleshooting prompt that guides through a systematic Kubernetes troubleshooting flow for pods based on a keyword and optional namespace
This server is missing a description.If you've used it, help the community.
Add informationLast scanned 2h ago
No open vulnerabilities. 2 fixed CVEs.
CVE-2025-66404Fixedmcp-server-kubernetes has potential security issue in exec_in_pod tool
### Summary A security issue exists in the `exec_in_pod` tool of the `mcp-server-kubernetes` MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (`sh -c`) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without expl
CVE-2025-53355FixedMCP Server Kubernetes vulnerable to command injection in several tools
### Summary A command injection vulnerability exists in the `mcp-server-kubernetes` MCP Server. The vulnerability is caused by the unsanitized use of input parameters within a call to `child_process.execSync`, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.