Skip to main content

CVE-2025-54867: CWE-61: UNIX Symbolic Link (Symlink) Following in youki-dev youki

High
VulnerabilityCVE-2025-54867cvecve-2025-54867cwe-61
Published: Thu Aug 14 2025 (08/14/2025, 16:08:00 UTC)
Source: CVE Database V5
Vendor/Project: youki-dev
Product: youki

Description

Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5.

AI-Powered Analysis

AILast updated: 08/14/2025, 16:33:04 UTC

Technical Analysis

CVE-2025-54867 is a high-severity vulnerability affecting the Youki container runtime, a Rust-based container runtime implementation. The vulnerability arises from improper handling of symbolic links (symlinks) within the container's root filesystem, specifically concerning the /proc and /sys directories. Prior to version 0.5.5, if these directories inside the container's root filesystem are symlinks rather than actual mount points, an attacker could exploit this behavior to escape the container sandbox and gain unauthorized access to the host's root filesystem. This is a classic example of CWE-61 (Improper Restriction of Symbolic Link), where following symlinks without adequate validation leads to privilege escalation and container breakout. The vulnerability requires local access with low privileges (PR:L) and has a high attack complexity (AC:H), meaning exploitation is not trivial but feasible under certain conditions. No user interaction is needed (UI:N), and the scope is unchanged (S:U), indicating the impact is confined to the vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), as an attacker could read, modify, or disrupt host system files by escaping the container. The issue was patched in Youki version 0.5.5 by presumably adding proper validation or disallowing symlink traversal for these critical directories. No known exploits are currently reported in the wild, but the vulnerability's nature makes it a significant risk for containerized environments using affected Youki versions. Given Youki's role as a container runtime, this vulnerability could be leveraged to compromise container isolation, leading to host system compromise.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for those relying on Youki as their container runtime in production or development environments. Container runtimes are foundational to modern cloud-native infrastructure, and a container breakout vulnerability undermines the fundamental security guarantees of containerization. Successful exploitation could lead to unauthorized access to sensitive host files, data exfiltration, or disruption of critical services. This risk is heightened in multi-tenant environments such as cloud service providers or shared infrastructure where container isolation is paramount. Additionally, organizations subject to strict data protection regulations like GDPR could face compliance violations if host systems are compromised, potentially resulting in data breaches and significant legal and financial repercussions. The high CVSS score reflects the severity and potential for serious operational impact. Although exploitation requires local access and some complexity, insider threats or compromised containers could serve as vectors. The absence of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading Youki to version 0.5.5 or later, where the issue is patched. For environments where immediate upgrade is not feasible, organizations should implement strict access controls to limit who can deploy or interact with containers running Youki, minimizing the risk of local exploitation. Container runtime configurations should be audited to ensure that /proc and /sys are not symlinked within container root filesystems. Employing runtime security tools that monitor for container breakout attempts and anomalous filesystem access can provide additional detection capabilities. Organizations should also consider isolating critical workloads on hardened hosts with minimal local user access and leverage container security best practices such as using minimal base images and restricting container capabilities. Regular vulnerability scanning and patch management processes should be enforced to detect and remediate vulnerable Youki versions promptly. Finally, security teams should monitor threat intelligence feeds for any emerging exploit attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-31T17:23:33.472Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689e0c2dad5a09ad005ca280

Added to database: 8/14/2025, 4:17:49 PM

Last enriched: 8/14/2025, 4:33:04 PM

Last updated: 9/27/2025, 12:13:06 AM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats