CVE-2025-13193: Incorrect Default Permissions
A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.
AI Analysis
Technical Summary
CVE-2025-13193 is a vulnerability identified in the libvirt virtualization management library, specifically affecting Red Hat Enterprise Linux 10. The issue stems from the incorrect default permissions assigned to external inactive snapshots of virtual machines that are shut down. These snapshots are created with world-readable permissions, meaning any user on the host system, including unprivileged users, can read the snapshot files. Since these snapshots contain the guest OS disk state, this misconfiguration leads to an information disclosure vulnerability. The vulnerability does not require user interaction and can be exploited by a local attacker with low privileges, making it relatively easy to exploit once local access is obtained. The CVSS 3.1 base score is 5.5, reflecting a medium severity primarily due to the impact on confidentiality without affecting integrity or availability. No known exploits have been reported in the wild yet. The vulnerability highlights a security oversight in default file permission settings within libvirt's snapshot handling, which could expose sensitive guest OS data such as configuration files, credentials, or other private information stored within the VM disk images. This flaw is particularly concerning in multi-tenant or shared environments where multiple users have local access to the host system. The vulnerability was publicly disclosed on November 17, 2025, and is assigned to Red Hat as the vendor project. While no patches or exploit code are currently linked, organizations using affected versions should proactively address the issue to prevent potential data leaks.
Potential Impact
For European organizations, the primary impact of CVE-2025-13193 is unauthorized information disclosure from virtual machine snapshots. This can lead to exposure of sensitive data such as credentials, proprietary information, or personal data stored within guest VMs. In sectors like finance, healthcare, and government, such leaks could result in regulatory non-compliance, reputational damage, and potential legal consequences under GDPR. Since the vulnerability requires local access, the risk is elevated in environments with multiple users or insufficient host access controls, such as shared hosting providers or large enterprises with many administrators. The flaw does not affect system integrity or availability, so direct system compromise or denial of service is unlikely. However, the confidentiality breach could be leveraged as a stepping stone for further attacks if sensitive information is extracted. European organizations relying heavily on Red Hat Enterprise Linux 10 and libvirt for virtualization infrastructure are at risk, especially those with complex multi-user environments or less stringent host access policies.
Mitigation Recommendations
To mitigate CVE-2025-13193, organizations should first apply any official patches or updates from Red Hat as soon as they become available. In the absence of patches, administrators should audit the permissions of external inactive snapshot files created by libvirt and manually restrict them to owner-only access (e.g., chmod 600). Implement strict host access controls to limit which users have local access to systems running libvirt, reducing the attack surface. Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to enforce additional restrictions on snapshot file access. Regularly monitor and log access to snapshot files to detect any unauthorized attempts. Additionally, consider encrypting VM disk images and snapshots to protect data at rest. Review and update virtualization security policies to ensure that snapshot management follows the principle of least privilege. Finally, educate system administrators about the risks of improper file permissions in virtualization environments to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-13193: Incorrect Default Permissions
Description
A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-13193 is a vulnerability identified in the libvirt virtualization management library, specifically affecting Red Hat Enterprise Linux 10. The issue stems from the incorrect default permissions assigned to external inactive snapshots of virtual machines that are shut down. These snapshots are created with world-readable permissions, meaning any user on the host system, including unprivileged users, can read the snapshot files. Since these snapshots contain the guest OS disk state, this misconfiguration leads to an information disclosure vulnerability. The vulnerability does not require user interaction and can be exploited by a local attacker with low privileges, making it relatively easy to exploit once local access is obtained. The CVSS 3.1 base score is 5.5, reflecting a medium severity primarily due to the impact on confidentiality without affecting integrity or availability. No known exploits have been reported in the wild yet. The vulnerability highlights a security oversight in default file permission settings within libvirt's snapshot handling, which could expose sensitive guest OS data such as configuration files, credentials, or other private information stored within the VM disk images. This flaw is particularly concerning in multi-tenant or shared environments where multiple users have local access to the host system. The vulnerability was publicly disclosed on November 17, 2025, and is assigned to Red Hat as the vendor project. While no patches or exploit code are currently linked, organizations using affected versions should proactively address the issue to prevent potential data leaks.
Potential Impact
For European organizations, the primary impact of CVE-2025-13193 is unauthorized information disclosure from virtual machine snapshots. This can lead to exposure of sensitive data such as credentials, proprietary information, or personal data stored within guest VMs. In sectors like finance, healthcare, and government, such leaks could result in regulatory non-compliance, reputational damage, and potential legal consequences under GDPR. Since the vulnerability requires local access, the risk is elevated in environments with multiple users or insufficient host access controls, such as shared hosting providers or large enterprises with many administrators. The flaw does not affect system integrity or availability, so direct system compromise or denial of service is unlikely. However, the confidentiality breach could be leveraged as a stepping stone for further attacks if sensitive information is extracted. European organizations relying heavily on Red Hat Enterprise Linux 10 and libvirt for virtualization infrastructure are at risk, especially those with complex multi-user environments or less stringent host access policies.
Mitigation Recommendations
To mitigate CVE-2025-13193, organizations should first apply any official patches or updates from Red Hat as soon as they become available. In the absence of patches, administrators should audit the permissions of external inactive snapshot files created by libvirt and manually restrict them to owner-only access (e.g., chmod 600). Implement strict host access controls to limit which users have local access to systems running libvirt, reducing the attack surface. Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to enforce additional restrictions on snapshot file access. Regularly monitor and log access to snapshot files to detect any unauthorized attempts. Additionally, consider encrypting VM disk images and snapshots to protect data at rest. Review and update virtualization security policies to ensure that snapshot management follows the principle of least privilege. Finally, educate system administrators about the risks of improper file permissions in virtualization environments to prevent similar issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2025-11-14T15:22:19.540Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691b5a78903b8a3ddb6f53b0
Added to database: 11/17/2025, 5:25:12 PM
Last enriched: 11/24/2025, 6:34:44 PM
Last updated: 1/7/2026, 8:54:57 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.