Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0750: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

0
Medium
VulnerabilityCVE-2025-0750cvecve-2025-0750
Published: Tue Jan 28 2025 (01/28/2025, 09:29:30 UTC)
Source: CVE Database V5

Description

A vulnerability was found in CRI-O. A path traversal issue in the log management functions (UnMountPodLogs and LinkContainerLogs) may allow an attacker with permissions to create and delete Pods to unmount arbitrary host paths, leading to node-level denial of service by unmounting critical system directories.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 17:49:49 UTC

Technical Analysis

CVE-2025-0750 is a path traversal vulnerability discovered in CRI-O, an open-source container runtime widely used in Kubernetes environments. The flaw exists in the log management functions UnMountPodLogs and LinkContainerLogs, which handle mounting and unmounting of container logs on the host filesystem. Due to improper validation of pathnames, an attacker with permissions to create and delete Pods can exploit this vulnerability to unmount arbitrary directories on the host node. This can include critical system directories that are essential for node stability and operation. By unmounting these directories, the attacker can cause a denial of service at the node level, disrupting container workloads and potentially impacting the entire cluster's availability. The CVSS 3.1 base score is 6.6 (medium), reflecting that the attack vector is local (requires access to the node or cluster with Pod creation/deletion rights), with low attack complexity and privileges required. No user interaction is needed, and the scope remains unchanged as the impact is confined to the affected node. Confidentiality and integrity impacts are limited since the vulnerability primarily affects availability through resource unmounting. There are no known exploits in the wild yet, but the vulnerability's presence in a critical container runtime component makes it a significant risk for Kubernetes clusters using CRI-O. The affected versions are not explicitly detailed beyond '0', suggesting early or initial versions may be impacted. The vulnerability was published on January 28, 2025, and assigned by Red Hat.

Potential Impact

The primary impact of CVE-2025-0750 is node-level denial of service in Kubernetes clusters using CRI-O as the container runtime. By unmounting critical system directories, an attacker can disrupt container log access and potentially destabilize the node, leading to workload outages and degraded cluster reliability. This can affect availability of services running on the node and may require node reboot or manual intervention to restore normal operations. While confidentiality and integrity impacts are limited, the disruption of logging and system directories can hinder incident response and forensic analysis. Organizations relying on CRI-O for container orchestration, especially those with multi-tenant clusters or less restrictive Pod creation permissions, face increased risk. The vulnerability could be leveraged in targeted attacks against cloud providers, managed Kubernetes services, or enterprise environments where attackers have gained limited cluster access. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as exploit development could follow disclosure.

Mitigation Recommendations

To mitigate CVE-2025-0750, organizations should first apply any available patches or updates from CRI-O maintainers or their Linux distribution vendors as soon as they are released. In the absence of patches, restrict permissions to create and delete Pods to trusted administrators only, minimizing the attack surface. Implement strict Role-Based Access Control (RBAC) policies in Kubernetes to limit Pod lifecycle management capabilities. Monitor node logs and system mounts for unusual unmount operations or errors related to container logs. Employ runtime security tools that can detect abnormal filesystem operations or privilege escalations. Consider isolating critical nodes or workloads to reduce exposure. Regularly audit cluster permissions and review container runtime configurations to ensure adherence to least privilege principles. Additionally, maintain backups and recovery procedures for nodes to quickly restore service in case of denial of service incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-01-27T13:53:22.286Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b36a78ad5a09ad009428ce

Added to database: 8/30/2025, 9:17:44 PM

Last enriched: 2/27/2026, 5:49:49 PM

Last updated: 3/25/2026, 12:14:51 AM

Views: 169

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses