Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15558: CWE-427 Uncontrolled Search Path Element in Docker Docker CLI

0
High
VulnerabilityCVE-2025-15558cvecve-2025-15558cwe-427
Published: Wed Mar 04 2026 (03/04/2026, 16:14:32 UTC)
Source: CVE Database V5
Vendor/Project: Docker
Product: Docker CLI

Description

Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker CLI is executed as a privileged user. This issue affects Docker CLI: through 29.1.5 and Windows binaries acting as a CLI-plugin manager using the github.com/docker/cli/cli-plugins/manager https://pkg.go.dev/github.com/docker/cli@v29.1.5+incompatible/cli-plugins/manager  package, such as Docker Compose. This issue does not impact non-Windows binaries, and projects not using the plugin-manager code.

AI-Powered Analysis

AILast updated: 03/04/2026, 16:48:48 UTC

Technical Analysis

CVE-2025-15558 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting Docker CLI on Windows platforms up to version 29.1.5. The issue arises because the Docker CLI searches for plugin binaries in the directory C:\ProgramData\Docker\cli-plugins, which is not created by default. This allows a low-privileged attacker with local access to create this directory and place malicious executables named as legitimate Docker CLI plugins (e.g., docker-compose.exe, docker-buildx.exe). When a victim user launches Docker Desktop or invokes Docker CLI plugin features, these malicious binaries are executed. If the Docker CLI is run with elevated privileges, this can lead to privilege escalation, allowing the attacker to execute arbitrary code with higher privileges. The vulnerability is specific to Windows binaries that use the Docker CLI plugin manager code from github.com/docker/cli/cli-plugins/manager. Non-Windows binaries and projects not using this plugin manager are not affected. The CVSS 4.0 score is 7.0 (high severity), reflecting the local attack vector, low complexity, no required authentication, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the common use of Docker in development and production environments on Windows.

Potential Impact

This vulnerability can have serious consequences for organizations using Docker on Windows. An attacker with low privileges and local access can escalate their privileges by placing malicious plugin binaries in the searched directory. This can lead to unauthorized code execution with elevated privileges, potentially compromising the entire host system. Confidentiality can be breached by accessing sensitive data, integrity can be undermined by altering system or application behavior, and availability can be impacted by disrupting Docker services or the host system. Organizations relying on Docker for container management, CI/CD pipelines, or development environments on Windows are at risk. The attack requires local access, so insider threats or compromised user accounts are primary vectors. Exploitation could facilitate lateral movement within networks and persistence, increasing the threat to enterprise environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Immediately update Docker CLI on Windows to a patched version once available from Docker, as no patch links are currently provided. 2) Restrict local user permissions to prevent unauthorized creation of directories under C:\ProgramData\Docker\cli-plugins. 3) Monitor and audit the C:\ProgramData\Docker\cli-plugins directory for unexpected files or changes. 4) Employ application whitelisting or endpoint protection solutions to detect and block execution of unauthorized binaries in this directory. 5) Educate users about the risks of running Docker CLI with elevated privileges and minimize such usage. 6) Consider running Docker Desktop and CLI with least privilege principles and avoid administrative execution unless necessary. 7) Implement robust local access controls and monitor for suspicious local activity that could indicate attempts to exploit this vulnerability. These steps go beyond generic advice by focusing on directory monitoring, privilege management, and proactive detection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Docker
Date Reserved
2026-02-03T19:51:18.184Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a85ed0d1a09e29cb4aedd6

Added to database: 3/4/2026, 4:33:20 PM

Last enriched: 3/4/2026, 4:48:48 PM

Last updated: 3/5/2026, 2:10:07 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses