Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14443: Server-Side Request Forgery (SSRF) in Red Hat Red Hat OpenShift Container Platform 4

0
Medium
VulnerabilityCVE-2025-14443cvecve-2025-14443
Published: Tue Dec 16 2025 (12/16/2025, 12:14:47 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4

Description

A flaw was found in ose-openshift-apiserver. This vulnerability allows internal network enumeration, service discovery, limited information disclosure, and potential denial-of-service (DoS) through Server-Side Request Forgery (SSRF) due to missing IP address and network-range validation when processing user-supplied image references.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 23:09:23 UTC

Technical Analysis

CVE-2025-14443 is a medium-severity SSRF vulnerability identified in the ose-openshift-apiserver component of Red Hat OpenShift Container Platform 4. The flaw stems from missing validation of IP addresses and network ranges when the server processes user-supplied image references. This lack of validation allows an attacker with appropriate privileges to craft requests that cause the server to make unintended HTTP requests to internal network resources. Through this SSRF, attackers can perform internal network enumeration and service discovery, gaining limited information about internal services that are otherwise inaccessible externally. Additionally, the vulnerability can be leveraged to cause denial-of-service (DoS) conditions by overwhelming internal services or the platform itself. The vulnerability requires privileges to submit image references but does not require user interaction, increasing the risk in environments where multiple users have such access. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L) indicates network exploitation with low complexity, partial confidentiality impact, no integrity impact, and limited availability impact. No known exploits have been reported in the wild, but the potential for reconnaissance and DoS makes this a significant concern for organizations relying on OpenShift for container orchestration and deployment. The vulnerability highlights the importance of strict validation of user inputs, especially in cloud-native platforms that interact with internal network resources.

Potential Impact

The impact of CVE-2025-14443 is multifaceted. Successful exploitation can lead to internal network reconnaissance, allowing attackers to map internal services and potentially identify further vulnerabilities or misconfigurations. This information disclosure can facilitate lateral movement within the network or targeted attacks against critical infrastructure. The potential for denial-of-service can disrupt container orchestration and application availability, affecting business continuity. Since OpenShift is widely used for deploying and managing containerized applications in enterprise and cloud environments, this vulnerability could affect a broad range of organizations, including those in finance, healthcare, government, and technology sectors. The requirement for privileges to submit image references somewhat limits the attack surface but does not eliminate risk, especially in multi-tenant or large organizations where many users have such access. The vulnerability could also be leveraged in supply chain attacks if attackers manipulate image references to target internal resources. Overall, the threat could lead to reduced confidentiality and availability of critical services, operational disruption, and increased risk of further compromise.

Mitigation Recommendations

To mitigate CVE-2025-14443, organizations should apply any available patches or updates from Red Hat promptly once released. In the absence of patches, implement strict network segmentation and firewall rules to restrict the OpenShift API server's outbound HTTP requests to trusted endpoints only. Employ egress filtering to prevent unauthorized internal network access via SSRF. Review and restrict user privileges to limit who can submit image references, applying the principle of least privilege. Enable logging and monitoring of API server requests to detect anomalous or unexpected outbound requests indicative of SSRF attempts. Consider deploying Web Application Firewalls (WAFs) or runtime security tools capable of detecting SSRF patterns. Conduct regular security assessments and penetration testing focused on SSRF and internal network exposure. Additionally, validate and sanitize all user inputs related to image references at the application level to enforce IP and network range restrictions. Finally, educate development and operations teams about SSRF risks and secure coding practices to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-10T13:21:32.732Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694151495e006677ae09a90a

Added to database: 12/16/2025, 12:32:09 PM

Last enriched: 2/27/2026, 11:09:23 PM

Last updated: 3/26/2026, 2:59:05 AM

Views: 268

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses