Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46810: CWE-61: UNIX Symbolic Link (Symlink) Following in openSUSE Tumbleweed

0
High
VulnerabilityCVE-2025-46810cvecve-2025-46810cwe-61
Published: Tue Sep 02 2025 (09/02/2025, 11:34:32 UTC)
Source: CVE Database V5
Vendor/Project: openSUSE
Product: Tumbleweed

Description

A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of openSUSE Tumbleweed traefik2 allows the traefik user to escalate to root. This issue affects Tumbleweed: from ? before 2.11.29.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:30:21 UTC

Technical Analysis

CVE-2025-46810 is a vulnerability classified under CWE-61, which pertains to UNIX symbolic link (symlink) following issues. Specifically, it affects the packaging of traefik2 in the openSUSE Tumbleweed rolling release distribution. The vulnerability arises because the traefik user, a service account used by the traefik2 reverse proxy/load balancer, can be tricked into following malicious symbolic links. This improper handling allows the traefik user to escalate privileges to root, effectively granting full system control. The affected versions are those prior to 2.11.29, though the exact range is unspecified. The vulnerability requires local access with traefik user privileges but does not require further authentication or user interaction. The CVSS 4.0 vector indicates the attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (AT:N), privileges required are low (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), indicating that exploitation can fully compromise the system. No known exploits have been reported in the wild, and no official patches have been linked yet, though the issue is publicly disclosed and assigned a CVE. This vulnerability is critical for environments where openSUSE Tumbleweed is used with traefik2, particularly in server and cloud deployments where traefik acts as a gateway or load balancer.

Potential Impact

The primary impact of CVE-2025-46810 is local privilege escalation from the traefik user to root, which can lead to complete system compromise. This enables attackers to gain full administrative control, potentially leading to unauthorized access to sensitive data, disruption of services, and the ability to install persistent malware or backdoors. Organizations relying on openSUSE Tumbleweed with traefik2 in production environments, especially those using it as a critical network component, face risks of service outages, data breaches, and lateral movement within their networks. The vulnerability's high CVSS score reflects the severity of impact on confidentiality, integrity, and availability. Although exploitation requires local access with traefik user privileges, the ease of privilege escalation makes it a significant threat in multi-user environments or where attackers have already compromised lower-privileged accounts. The lack of known exploits in the wild currently reduces immediate risk, but the public disclosure increases the likelihood of future exploit development. This vulnerability could be particularly damaging in sectors such as cloud service providers, telecommunications, financial services, and government infrastructure where openSUSE Tumbleweed and traefik2 are deployed.

Mitigation Recommendations

1. Immediately restrict local access to systems running openSUSE Tumbleweed with traefik2 to trusted users only, minimizing the risk of local exploitation. 2. Monitor and audit the use of the traefik user account and related processes for unusual activity or privilege escalation attempts. 3. Apply the official patch or update to traefik2 version 2.11.29 or later as soon as it becomes available from openSUSE or the traefik project. 4. If patching is delayed, consider temporarily disabling or restricting the traefik service or running it with reduced privileges and enhanced sandboxing to limit potential damage. 5. Employ file system monitoring to detect unauthorized creation or manipulation of symbolic links that could be exploited. 6. Use mandatory access control (MAC) frameworks such as AppArmor or SELinux to enforce strict policies on the traefik user and its ability to follow symlinks or access sensitive files. 7. Educate system administrators about the vulnerability and ensure they follow best practices for privilege separation and least privilege principles. 8. Regularly review and update system and application configurations to minimize attack surface and ensure compliance with security policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2025-04-30T11:28:04.728Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b6d960ad5a09ad00dc4a2d

Added to database: 9/2/2025, 11:47:44 AM

Last enriched: 2/27/2026, 2:30:21 AM

Last updated: 3/24/2026, 3:35:56 PM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses