Rancher Extensions have arbitrary file access via path traversal
Summary
| CVE | CVE-2026-25705 |
|---|---|
| State | PUBLISHED |
| Assigner | suse |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-13 08:16:16 UTC |
| Updated | 2026-05-13 15:35:35 UTC |
| Description | A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A malicious UI extension could abuse that to: * Overwrite Rancher binaries or configuration to inject code. * Write to /var/lib/rancher/ to tamper with cluster state. * If hostPath volumes are mounted, write to the host node filesystem. * Use this issue to chain with other attack vectors. |
Risk And Classification
Primary CVSS: v3.1 8.4 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
EPSS: 0.000420000 probability, percentile 0.127730000 (date 2026-05-13)
Problem Types: CWE-35 | CWE-35 CWE-35 Path traversal: '.../...//'
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 8.4 | HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 8.4 | HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
HighUser Interaction
RequiredScope
ChangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/rancher/rancher/security/advisories/GHSA-5v3h-x4wf-5c35 | [email protected] | github.com | |
| bugzilla.suse.com/show_bug.cgi | [email protected] | bugzilla.suse.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: https://github.com/KoreaSecurity (en)
There are currently no legacy QID mappings associated with this CVE.