It's possible? Yes. There's no law of Universe stopping that to happen.
It's trivial? Not at all.
An attacker can start on the API and end on the host, but he would have to breach a lot of layer to get there.
He would need to achieve code execution on the application, execute code outside of the application boundaries, get access to the container, exploit the container runtime to escape it, compromise the cluster, compromise the K8S runtime, escape it, and achieve code execution on the host.
And if you take into account that a container usually hosts only the bare minimum to run the application, you see how difficult is to start on it and end on the host.
It's doable, but very unlikely: it needs a long chain of exploits to succeed. The longer the chain, the more difficult.