ACS is vulnerable to an XSS attack if script code is included in a small subset of table cells. The only known potential exploit at this time is if script is included in the name of a kubernetes “Role” object* that isapplied to a secured cluster. This object can be applied via a user withaccess to the cluster, or through a compromised third-party product. Otherfields are susceptible as well but at this point there is no proof o concept injecting scripts into these fields.