Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54286: CWE-352 Cross-Site Request Forgery (CSRF) in Canonical LXD

0
High
VulnerabilityCVE-2025-54286cvecve-2025-54286cwe-352
Published: Thu Oct 02 2025 (10/02/2025, 09:12:49 UTC)
Source: CVE Database V5
Vendor/Project: Canonical
Product: LXD

Description

Cross-Site Request Forgery (CSRF) in LXD-UI in Canonical LXD versions >= 5.0 on Linux allows an attacker to create and start container instances without user consent via crafted HTML form submissions exploiting client certificate authentication.

AI-Powered Analysis

AILast updated: 10/09/2025, 11:13:32 UTC

Technical Analysis

CVE-2025-54286 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the LXD-UI component of Canonical's LXD container management system, affecting versions 5.0, 5.21, and 6.0 on Linux platforms. LXD is widely used for managing Linux containers, providing a lightweight virtualization environment. The vulnerability arises because the LXD-UI improperly validates requests that leverage client certificate authentication, allowing an attacker to craft malicious HTML forms that, when visited by an authenticated user, can trigger unauthorized actions such as creating and starting container instances. This CSRF attack does not require the attacker to have prior authentication but does require the victim to interact with a malicious webpage or content. The attack complexity is high due to the need for precise form crafting and user interaction, but the impact is significant because it can lead to unauthorized container deployment, which may be used as a foothold for further attacks, lateral movement, or resource abuse. The vulnerability has a CVSS 4.0 base score of 7.5, indicating high severity, with high impact on confidentiality, integrity, and availability, but limited scope and attack surface. No patches or exploits are currently publicly available, but the vulnerability is officially published and should be addressed promptly.

Potential Impact

For European organizations, especially those leveraging Canonical LXD for container orchestration and management, this vulnerability poses a significant risk. Unauthorized creation and starting of containers can lead to resource exhaustion, unauthorized code execution, or deployment of malicious containers that compromise internal networks. Critical sectors such as finance, telecommunications, and government agencies that rely on containerized environments for scalable and isolated workloads could face data breaches, service disruptions, or compliance violations. The exploitation requires user interaction, which may limit widespread automated attacks but increases risk through targeted phishing or social engineering campaigns. Additionally, the use of client certificate authentication in LXD environments is common in high-security setups, meaning that even well-protected environments could be vulnerable if users are tricked into visiting malicious content. The lack of known exploits in the wild provides a window for mitigation, but the high severity score necessitates immediate attention to prevent potential future attacks.

Mitigation Recommendations

1. Apply patches or updates from Canonical as soon as they become available for LXD versions 5.0, 5.21, and 6.0. 2. Implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks by limiting cross-origin requests. 3. Enforce multi-factor authentication and limit the use of client certificate authentication where possible or combine it with additional CSRF tokens or anti-forgery mechanisms. 4. Educate users about the risks of clicking on untrusted links or visiting suspicious websites, especially in environments where LXD is used. 5. Monitor container creation and startup logs for unusual activity that could indicate exploitation attempts. 6. Restrict network access to the LXD-UI interface to trusted networks or VPNs to reduce exposure. 7. Consider implementing web application firewalls (WAF) with CSRF protection rules tailored to LXD-UI traffic. 8. Conduct regular security assessments and penetration tests focusing on container management interfaces to detect similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
canonical
Date Reserved
2025-07-18T07:59:07.916Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68de5841274727b051111928

Added to database: 10/2/2025, 10:47:29 AM

Last enriched: 10/9/2025, 11:13:32 AM

Last updated: 11/14/2025, 11:14:37 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats