Skip to main content

CVE-2025-54286: CWE-352 Cross-Site Request Forgery (CSRF) in Canonical LXD

High
VulnerabilityCVE-2025-54286cvecve-2025-54286cwe-352
Published: Thu Oct 02 2025 (10/02/2025, 09:12:49 UTC)
Source: CVE Database V5
Vendor/Project: Canonical
Product: LXD

Description

Cross-Site Request Forgery (CSRF) in LXD-UI in Canonical LXD versions >= 5.0 on Linux allows an attacker to create and start container instances without user consent via crafted HTML form submissions exploiting client certificate authentication.

AI-Powered Analysis

AILast updated: 10/02/2025, 10:47:56 UTC

Technical Analysis

CVE-2025-54286 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Canonical's LXD container management system, specifically versions 5.0, 5.21, and 6.0 on Linux platforms. LXD is a widely used system container manager that provides a REST API and a user interface (LXD-UI) for managing container instances. The vulnerability arises from insufficient CSRF protections in the LXD-UI, allowing an attacker to exploit client certificate authentication mechanisms to perform unauthorized actions. By crafting malicious HTML form submissions, an attacker can trick an authenticated user into unknowingly creating and starting new container instances without their consent. This attack vector leverages the victim's active session and client certificates, bypassing typical authentication barriers. The CVSS 4.0 base score of 7.5 reflects the network attack vector (AV:N), high attack complexity (AC:H), partial attack prerequisites (AT:P), no privileges required (PR:N), and user interaction needed (UI:A). The vulnerability impacts confidentiality, integrity, and availability at a high level, as unauthorized container creation could lead to resource exhaustion, deployment of malicious containers, or lateral movement within the host environment. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a critical container management tool demands prompt attention. The lack of available patches at the time of publication further increases the risk for organizations relying on these LXD versions.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for enterprises and service providers utilizing LXD for container orchestration and virtualization. Unauthorized container creation can lead to resource depletion, potentially causing denial of service conditions on critical infrastructure. Furthermore, attackers might deploy malicious containers to pivot within internal networks, compromising sensitive data or disrupting operations. Given the increasing adoption of container technologies in sectors such as finance, telecommunications, and government services across Europe, exploitation could result in operational downtime, data breaches, and regulatory non-compliance under frameworks like GDPR. The reliance on client certificate authentication in LXD-UI means that even well-secured environments could be vulnerable if users are tricked into interacting with malicious content. This elevates the threat level for organizations with remote or hybrid workforces where phishing and social engineering attacks are prevalent.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement several targeted measures beyond generic advice: 1) Immediately audit and restrict access to LXD-UI interfaces, limiting exposure to trusted networks and users only. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF-like requests targeting LXD endpoints. 3) Enforce strict Content Security Policies (CSP) and SameSite cookie attributes to reduce the risk of CSRF attacks via browsers. 4) Educate users about the risks of interacting with untrusted web content while authenticated to LXD-UI, emphasizing phishing awareness. 5) Monitor container creation logs and network activity for anomalous patterns indicative of unauthorized container instantiation. 6) Where feasible, disable or limit client certificate authentication temporarily until patches are available. 7) Engage with Canonical support channels to obtain patches or mitigations as soon as they are released and plan for prompt deployment. 8) Consider implementing multi-factor authentication (MFA) for LXD management interfaces to add an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
canonical
Date Reserved
2025-07-18T07:59:07.916Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68de5841274727b051111928

Added to database: 10/2/2025, 10:47:29 AM

Last enriched: 10/2/2025, 10:47:56 AM

Last updated: 10/2/2025, 1:33:12 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats