Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59291: CWE-73: External Control of File Name or Path in Microsoft Azure Compute Gallery

0
High
VulnerabilityCVE-2025-59291cvecve-2025-59291cwe-73
Published: Tue Oct 14 2025 (10/14/2025, 17:00:50 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Compute Gallery

Description

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:03:22 UTC

Technical Analysis

CVE-2025-59291 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Azure Compute Gallery, specifically Confidential Azure Container Instances. This flaw allows an authorized attacker who already has high privileges on the system to manipulate file names or paths externally, leading to local privilege escalation. The vulnerability arises from insufficient validation or sanitization of file path inputs, enabling attackers to influence file system operations in a way that escalates their privileges beyond intended limits. The CVSS 3.1 base score is 8.2, reflecting a high severity due to its impact on confidentiality, integrity, and availability, combined with the requirement for high privileges but no user interaction. The vulnerability has been publicly disclosed as of October 14, 2025, but no patches or known exploits have been reported yet. This vulnerability is particularly critical for organizations using Azure Confidential Computing features, which are designed to protect sensitive workloads. Exploitation could allow attackers to access or modify sensitive data, disrupt services, or further compromise the cloud environment. The vulnerability’s scope is limited to environments where attackers have existing high privileges, but the potential damage within those environments is severe due to the escalation capability and the critical nature of the affected cloud services.

Potential Impact

The impact of CVE-2025-59291 is significant for organizations utilizing Microsoft Azure Compute Gallery, especially those deploying Confidential Azure Container Instances for sensitive or regulated workloads. Successful exploitation allows attackers with existing high privileges to escalate their access locally, potentially gaining full control over container instances and underlying resources. This can lead to unauthorized access to confidential data, modification or deletion of critical files, and disruption of cloud services. The compromise of confidential computing environments undermines trust in data protection guarantees, potentially exposing sensitive intellectual property, personal data, or compliance-related information. Organizations relying heavily on Azure for cloud infrastructure, particularly in sectors like finance, healthcare, government, and critical infrastructure, face increased risk of data breaches, service outages, and regulatory penalties. The lack of known exploits currently limits immediate widespread impact, but the vulnerability’s public disclosure increases the risk of future exploitation attempts. Overall, the vulnerability threatens confidentiality, integrity, and availability of cloud workloads, making it a critical concern for cloud security posture.

Mitigation Recommendations

To mitigate CVE-2025-59291, organizations should: 1) Monitor Microsoft’s official channels closely for patches or updates addressing this vulnerability and apply them promptly once available. 2) Restrict and audit administrative and high-privilege access to Azure Confidential Container Instances to minimize the number of users who can exploit this vulnerability. 3) Implement strict input validation and file path sanitization controls within custom applications or scripts interacting with Azure Compute Gallery resources. 4) Employ Azure security features such as Azure Defender and Azure Policy to detect anomalous behaviors related to file path manipulations or privilege escalations. 5) Conduct regular security assessments and penetration testing focused on container environments to identify potential exploitation paths. 6) Use role-based access control (RBAC) and least privilege principles rigorously to limit the scope of potential attackers. 7) Maintain comprehensive logging and monitoring of file system operations and privilege changes within Azure environments to enable rapid detection and response. 8) Educate cloud administrators and DevOps teams about the risks associated with external control of file paths and the importance of secure configuration management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T19:36:03.690Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85903dd1bfb0b7e42399

Added to database: 10/14/2025, 5:17:04 PM

Last enriched: 2/28/2026, 2:03:22 PM

Last updated: 3/24/2026, 10:37:02 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses