Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4953: Creation of Temporary File With Insecure Permissions

0
High
VulnerabilityCVE-2025-4953cvecve-2025-4953
Published: Tue Sep 16 2025 (09/16/2025, 14:54:50 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4.12

Description

A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.

AI-Powered Analysis

AILast updated: 01/15/2026, 11:55:12 UTC

Technical Analysis

CVE-2025-4953 is a vulnerability discovered in Podman, specifically impacting the Red Hat OpenShift Container Platform 4.12. The flaw is related to the handling of temporary files during container image builds that use the RUN --mount=type=bind directive. Normally, data written to bind mounts during the build process should be ephemeral and discarded after the build completes. However, due to this vulnerability, files created inside the container during the build persist in the temporary build context directory on the host system. These files are created with insecure permissions, potentially allowing unauthorized users on the host to access sensitive data generated during the build process. The vulnerability affects confidentiality and integrity because sensitive information or build artifacts could be exposed or tampered with. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) indicates that the attack can be performed remotely over the network without authentication or user interaction, but requires high attack complexity. The scope is unchanged, meaning the impact is confined to the vulnerable component. No known exploits have been reported yet, but the risk remains significant given the widespread use of Podman and OpenShift in containerized environments. The issue highlights the importance of secure temporary file handling and isolation in container build processes to prevent leakage of sensitive data from containerized workflows to the host environment.

Potential Impact

For European organizations, especially those leveraging containerized infrastructure with Red Hat OpenShift or Podman, this vulnerability can lead to unauthorized disclosure of sensitive build-time data, including secrets, credentials, or proprietary code artifacts. Exposure of such information could facilitate further attacks, including privilege escalation or lateral movement within the network. The integrity of build artifacts may also be compromised if attackers modify files in the temporary build context. This risk is heightened in multi-tenant environments or shared build servers where multiple users have access to the host system. Critical sectors such as finance, healthcare, and government agencies in Europe that rely on container orchestration for application deployment could face operational disruptions or data breaches. The vulnerability does not directly affect availability but can undermine trust in the build pipeline and container security posture. Given the high CVSS score and the nature of the flaw, organizations must treat this as a priority security concern.

Mitigation Recommendations

To mitigate CVE-2025-4953, European organizations should take the following specific actions: 1) Immediately audit and restrict access permissions on temporary build context directories to prevent unauthorized host users from reading or modifying files created during container builds. 2) Isolate build environments by using dedicated build hosts or virtual machines with strict access controls to limit exposure. 3) Monitor file system activity in build directories for unusual or unexpected file creation patterns that could indicate exploitation attempts. 4) Apply vendor patches or updates from Red Hat as soon as they become available to address the root cause of the vulnerability. 5) Review and harden Podman build configurations, avoiding unnecessary use of bind mounts during builds or employing alternative build strategies that do not expose sensitive data on the host. 6) Implement container security best practices such as using ephemeral build environments and minimizing the use of privileged operations during builds. 7) Educate DevOps and security teams about the risks associated with insecure temporary file handling in container builds to improve detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-19T11:55:32.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c97badd327290d6e7319d0

Added to database: 9/16/2025, 3:01:01 PM

Last enriched: 1/15/2026, 11:55:12 AM

Last updated: 2/7/2026, 9:34:26 AM

Views: 198

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats