CVE-2025-58061: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in openebs rawfile-localpv
OpenEBS Local PV RawFile allows dynamic deployment of Stateful Persistent Node-Local Volumes & Filesystems for Kubernetes. Prior to version 0.10.0, persistent volume data is world readable and that would allow non-privileged users to access sensitive data such as databases of k8s workload. The rawfile-localpv storage class creates persistent volume data under /var/csi/rawfile/ on Kubernetes hosts by default. However, the directory and data in it are world-readable. It allows non-privileged users to access the whole persistent volume data, and those can include sensitive information such as a whole database if the Kubernetes tenants are running MySQL or PostgreSQL in a container so it could lead to a database breach. This issue has been patched in version 0.10.0.
AI Analysis
Technical Summary
CVE-2025-58061 is a medium-severity vulnerability affecting OpenEBS rawfile-localpv versions prior to 0.10.0. OpenEBS is a cloud-native storage solution for Kubernetes, and the rawfile-localpv storage class enables dynamic provisioning of persistent node-local volumes and filesystems. The vulnerability arises because the persistent volume data created under the default directory /var/csi/rawfile/ on Kubernetes hosts is world-readable. This misconfiguration allows any non-privileged user on the host to access the entire persistent volume data, which may contain sensitive information such as databases (e.g., MySQL, PostgreSQL) running inside Kubernetes pods. Since the data is exposed at the host filesystem level, unauthorized users can read confidential data without requiring elevated privileges or user interaction. The vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS 3.1 base score is 5.5, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, no integrity or availability impact. This vulnerability could lead to data breaches of sensitive workloads hosted on Kubernetes clusters using affected OpenEBS versions. The issue has been patched in version 0.10.0 by correcting the permissions on the persistent volume data directory to prevent unauthorized read access.
Potential Impact
For European organizations deploying Kubernetes clusters with OpenEBS rawfile-localpv storage class versions prior to 0.10.0, this vulnerability poses a significant risk of sensitive data exposure. Attackers or malicious insiders with local access to Kubernetes host nodes can read persistent volume data, potentially extracting confidential business information, customer data, or intellectual property stored in databases running inside containers. This can lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial penalties. Since the vulnerability does not require user interaction and only low privileges, it increases the risk from insider threats or compromised hosts. The impact is particularly critical for organizations running multi-tenant Kubernetes environments or those with strict data confidentiality requirements. However, the vulnerability does not affect data integrity or availability, limiting the scope to confidentiality breaches only.
Mitigation Recommendations
European organizations should immediately upgrade OpenEBS rawfile-localpv to version 0.10.0 or later, where the directory permissions issue is fixed. Until the upgrade is possible, organizations should manually verify and restrict permissions on the /var/csi/rawfile/ directory on Kubernetes hosts to prevent world-readable access, ensuring only the Kubernetes system and authorized users can read the persistent volume data. Implement strict host access controls and monitoring to detect unauthorized local access attempts. Employ Kubernetes security best practices such as node isolation, limiting SSH access, and using Role-Based Access Control (RBAC) to minimize the number of users with host-level access. Additionally, encrypting sensitive data at rest within the containers or databases can reduce the impact of unauthorized read access. Regular audits and vulnerability scanning of Kubernetes clusters should include checks for this vulnerability until fully remediated.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-58061: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in openebs rawfile-localpv
Description
OpenEBS Local PV RawFile allows dynamic deployment of Stateful Persistent Node-Local Volumes & Filesystems for Kubernetes. Prior to version 0.10.0, persistent volume data is world readable and that would allow non-privileged users to access sensitive data such as databases of k8s workload. The rawfile-localpv storage class creates persistent volume data under /var/csi/rawfile/ on Kubernetes hosts by default. However, the directory and data in it are world-readable. It allows non-privileged users to access the whole persistent volume data, and those can include sensitive information such as a whole database if the Kubernetes tenants are running MySQL or PostgreSQL in a container so it could lead to a database breach. This issue has been patched in version 0.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-58061 is a medium-severity vulnerability affecting OpenEBS rawfile-localpv versions prior to 0.10.0. OpenEBS is a cloud-native storage solution for Kubernetes, and the rawfile-localpv storage class enables dynamic provisioning of persistent node-local volumes and filesystems. The vulnerability arises because the persistent volume data created under the default directory /var/csi/rawfile/ on Kubernetes hosts is world-readable. This misconfiguration allows any non-privileged user on the host to access the entire persistent volume data, which may contain sensitive information such as databases (e.g., MySQL, PostgreSQL) running inside Kubernetes pods. Since the data is exposed at the host filesystem level, unauthorized users can read confidential data without requiring elevated privileges or user interaction. The vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS 3.1 base score is 5.5, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, high confidentiality impact, no integrity or availability impact. This vulnerability could lead to data breaches of sensitive workloads hosted on Kubernetes clusters using affected OpenEBS versions. The issue has been patched in version 0.10.0 by correcting the permissions on the persistent volume data directory to prevent unauthorized read access.
Potential Impact
For European organizations deploying Kubernetes clusters with OpenEBS rawfile-localpv storage class versions prior to 0.10.0, this vulnerability poses a significant risk of sensitive data exposure. Attackers or malicious insiders with local access to Kubernetes host nodes can read persistent volume data, potentially extracting confidential business information, customer data, or intellectual property stored in databases running inside containers. This can lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial penalties. Since the vulnerability does not require user interaction and only low privileges, it increases the risk from insider threats or compromised hosts. The impact is particularly critical for organizations running multi-tenant Kubernetes environments or those with strict data confidentiality requirements. However, the vulnerability does not affect data integrity or availability, limiting the scope to confidentiality breaches only.
Mitigation Recommendations
European organizations should immediately upgrade OpenEBS rawfile-localpv to version 0.10.0 or later, where the directory permissions issue is fixed. Until the upgrade is possible, organizations should manually verify and restrict permissions on the /var/csi/rawfile/ directory on Kubernetes hosts to prevent world-readable access, ensuring only the Kubernetes system and authorized users can read the persistent volume data. Implement strict host access controls and monitoring to detect unauthorized local access attempts. Employ Kubernetes security best practices such as node isolation, limiting SSH access, and using Role-Based Access Control (RBAC) to minimize the number of users with host-level access. Additionally, encrypting sensitive data at rest within the containers or databases can reduce the impact of unauthorized read access. Regular audits and vulnerability scanning of Kubernetes clusters should include checks for this vulnerability until fully remediated.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-22T14:30:32.222Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b0d58dad5a09ad00700b2c
Added to database: 8/28/2025, 10:17:49 PM
Last enriched: 8/28/2025, 10:33:08 PM
Last updated: 8/29/2025, 12:34:43 AM
Views: 4
Related Threats
CVE-2025-9441: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in iatspaymentsdev iATS Online Forms
MediumCVE-2025-9374: CWE-352 Cross-Site Request Forgery (CSRF) in briancolinger Ultimate Tag Warrior Importer
MediumCVE-2025-8619: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in garbowza OSM Map Widget for Elementor
MediumCVE-2025-8290: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in weblineindia List Subpages
MediumCVE-2025-8147: CWE-285 Improper Authorization in aurelienlws LWSCache
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.