Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53880: CWE-35: Path Traversal in SUSE Container suse/manager/4.3/proxy-httpd:latest

0
High
VulnerabilityCVE-2025-53880cvecve-2025-53880cwe-35
Published: Thu Oct 30 2025 (10/30/2025, 10:31:15 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: Container suse/manager/4.3/proxy-httpd:latest

Description

A Path Traversal vulnerability in the tftpsync/add and tftpsync/delete scripts allows a remote attacker on an adjacent network to write or delete files on the filesystem with the privileges of the unprivileged wwwrun user. Although the endpoint is unauthenticated, access is restricted to a list of allowed IP addresses.

AI-Powered Analysis

AILast updated: 11/06/2025, 11:12:24 UTC

Technical Analysis

CVE-2025-53880 is a path traversal vulnerability classified under CWE-35, found in the SUSE Manager container image suse/manager/4.3/proxy-httpd:latest. The vulnerability resides in the tftpsync/add and tftpsync/delete scripts, which are used for file synchronization via TFTP. An attacker on an adjacent network can exploit this flaw to write or delete arbitrary files on the container's filesystem. The exploitation occurs with the privileges of the wwwrun user, which is an unprivileged account typically used by the web server process. Although the vulnerable endpoint does not require authentication, access is restricted to a predefined list of allowed IP addresses, reducing the attack surface but not eliminating risk. The CVSS 4.0 vector indicates the attack requires adjacent network access (AV:A), has low attack complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and results in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can fully compromise data confidentiality, modify or delete files, and disrupt service availability within the container environment. No patches or exploit code are currently publicly available, but the vulnerability is officially published and tracked. The lack of authentication combined with path traversal allows attackers to escape intended directory restrictions and manipulate critical files, potentially leading to container compromise or lateral movement within the network. The vulnerability affects the latest 4.3 version of the SUSE Manager proxy-httpd container, commonly used in enterprise Linux environments for system management and orchestration.

Potential Impact

For European organizations, the impact of CVE-2025-53880 can be significant, especially for those relying on SUSE Manager containers for infrastructure management. Successful exploitation allows attackers to write or delete arbitrary files, potentially leading to unauthorized code execution, data corruption, or service disruption. This can compromise the confidentiality and integrity of managed systems and data, and availability of management services. Given the wwwrun user privileges, attackers may not gain root access directly but can escalate privileges through further exploitation. The vulnerability's network adjacency requirement means attackers need to be on the same local or VPN network segment, which is common in internal corporate environments. This elevates risk in segmented networks where lateral movement is possible. Critical sectors such as finance, manufacturing, and government agencies using SUSE Manager for patching and configuration management could face operational disruptions or data breaches. The lack of authentication on the vulnerable endpoint increases risk if IP whitelisting is misconfigured or bypassed. Overall, the vulnerability threatens the security posture of European enterprises that deploy SUSE Manager containers in networked environments.

Mitigation Recommendations

To mitigate CVE-2025-53880, organizations should first verify and strictly enforce IP address whitelisting on the vulnerable tftpsync endpoints to limit access to trusted hosts only. Network segmentation should be enhanced to prevent untrusted systems from reaching the container's proxy-httpd service. Monitoring and alerting should be implemented for unusual file system changes or deletions performed by the wwwrun user within the container environment. Until an official patch or updated container image is released by SUSE, consider deploying compensating controls such as firewall rules, network access control lists (ACLs), or VPN restrictions to isolate the vulnerable service. Review and harden container configurations to minimize privileges and restrict file system access where possible. Conduct regular audits of container logs and file integrity monitoring to detect exploitation attempts early. Engage with SUSE support channels to obtain patches or guidance promptly. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect path traversal attempts targeting the tftpsync scripts. Finally, educate network administrators about the risks of adjacent network attacks and the importance of maintaining strict network boundaries.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2025-07-11T10:53:52.681Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690340b1aebfcd547455b960

Added to database: 10/30/2025, 10:40:49 AM

Last enriched: 11/6/2025, 11:12:24 AM

Last updated: 12/15/2025, 4:38:57 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats