Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4953: Creation of Temporary File With Insecure Permissions in Red Hat Red Hat OpenShift Container Platform 4.12

0
High
VulnerabilityCVE-2025-4953cvecve-2025-4953
Published: Tue Sep 16 2025 (09/16/2025, 14:54:50 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4.12

Description

A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.

AI-Powered Analysis

AILast updated: 10/17/2025, 04:11:43 UTC

Technical Analysis

CVE-2025-4953 is a vulnerability identified in Red Hat OpenShift Container Platform version 4.12, specifically related to the Podman container engine used during container image builds. The flaw arises from the handling of RUN commands that use the --mount=type=bind option during the podman build process. Normally, data written to these bind mounts during the build should be discarded after the build completes to avoid leaving residual files on the host system. However, due to this vulnerability, files created inside the container during the build persist in the temporary build context directory on the host machine. These files may be created with insecure permissions, making them accessible to unauthorized users or processes on the host. This exposure can lead to confidentiality breaches if sensitive data is written during the build, or integrity issues if malicious files are introduced or modified. The vulnerability has a CVSS 3.1 base score of 7.4, reflecting a network attack vector with high impact on confidentiality and integrity, no privileges required, no user interaction, but with high attack complexity. While no public exploits are known, the nature of the vulnerability means that attackers with network access could potentially retrieve sensitive build artifacts or manipulate build outputs by accessing the temporary directories. The issue affects containerized build environments and DevOps pipelines that rely on Podman within OpenShift, which are commonly used in enterprise and cloud-native deployments. The vulnerability was reserved in May 2025 and published in September 2025, with no patch links currently provided, indicating that remediation may still be pending or in progress.

Potential Impact

For European organizations, the impact of CVE-2025-4953 can be significant, particularly for those using Red Hat OpenShift 4.12 in production or development environments. The exposure of temporary build files on the host can lead to leakage of sensitive information such as credentials, proprietary code, or configuration files. This can undermine confidentiality and potentially enable further attacks such as privilege escalation or lateral movement within the network. Integrity is also at risk if attackers can modify or inject malicious files into the build context, potentially resulting in compromised container images that propagate through deployment pipelines. Availability is less directly impacted, as the vulnerability does not enable denial-of-service conditions. However, the trustworthiness of container images and the security of CI/CD pipelines may be compromised, leading to operational disruptions. Organizations in Europe with strict data protection regulations (e.g., GDPR) may face compliance risks if sensitive data is exposed. The vulnerability's exploitation complexity is high, but the lack of required privileges or user interaction means that attackers with network access could attempt to exploit it remotely. This elevates the risk profile for cloud-hosted OpenShift clusters and multi-tenant environments common in European enterprises.

Mitigation Recommendations

To mitigate CVE-2025-4953, European organizations should implement several specific measures beyond generic container security best practices. First, restrict access permissions on the host's temporary build context directories to only trusted users and processes, minimizing the risk of unauthorized file access. Second, monitor and audit file creation and access patterns within these temporary directories to detect anomalous activity indicative of exploitation attempts. Third, consider isolating build environments using dedicated build nodes or ephemeral build containers that are destroyed immediately after use, reducing persistent exposure. Fourth, avoid writing sensitive data to RUN --mount=type=bind mounts during builds or use alternative build strategies that do not rely on bind mounts. Fifth, stay vigilant for vendor patches or updates from Red Hat and apply them promptly once available. Additionally, implement network segmentation and strict access controls around build infrastructure to limit attacker reach. Finally, review and harden CI/CD pipeline configurations to ensure no sensitive information is inadvertently exposed during container image builds.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-19T11:55:32.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c97badd327290d6e7319d0

Added to database: 9/16/2025, 3:01:01 PM

Last enriched: 10/17/2025, 4:11:43 AM

Last updated: 11/1/2025, 7:54:56 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats