Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62878: CWE-23: Relative Path Traversal in SUSE Rancher

0
Critical
VulnerabilityCVE-2025-62878cvecve-2025-62878cwe-23
Published: Wed Feb 25 2026 (02/25/2026, 10:49:29 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: Rancher

Description

CVE-2025-62878 is a critical relative path traversal vulnerability in SUSE Rancher that allows a malicious user with limited privileges to manipulate the pathPattern parameter to create PersistentVolumes at arbitrary locations on the host node. This can lead to overwriting sensitive files or unauthorized access to directories, severely impacting confidentiality, integrity, and availability. The vulnerability has a CVSS score of 9. 9, indicating critical severity, and does not require user interaction but does require some level of privileges. No known exploits are currently reported in the wild. Organizations using SUSE Rancher should urgently review their deployments and apply mitigations to prevent exploitation. Countries with significant SUSE Rancher adoption and strategic cloud infrastructure are at higher risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 11:26:11 UTC

Technical Analysis

CVE-2025-62878 is a critical security vulnerability classified under CWE-23 (Relative Path Traversal) affecting SUSE Rancher, a popular container management platform. The flaw arises from insufficient validation of the parameters.pathPattern input, which an attacker with limited privileges can manipulate to create PersistentVolumes in arbitrary filesystem locations on the host node. This path traversal allows overwriting or unauthorized access to sensitive files and directories outside the intended container storage paths. The vulnerability impacts Rancher versions identified as '0' (likely indicating early or specific versions), and was published on February 25, 2026. The CVSS 3.1 base score is 9.9, reflecting its critical nature with network attack vector, low attack complexity, privileges required, no user interaction, and scope change. Exploiting this vulnerability can compromise confidentiality by exposing sensitive data, integrity by overwriting critical files, and availability by disrupting system operations. Although no known exploits are reported in the wild, the severity and ease of exploitation make it a high-priority issue. The vulnerability requires authenticated access with some privileges, emphasizing the need for strict access controls. The lack of patch links suggests a patch may not yet be publicly available, increasing urgency for mitigations.

Potential Impact

The impact of CVE-2025-62878 is severe for organizations deploying SUSE Rancher for container orchestration and management. Attackers exploiting this vulnerability can gain unauthorized access to host filesystem locations, potentially overwriting critical system or application files, leading to system compromise, data breaches, or denial of service. This can disrupt containerized workloads, compromise sensitive data stored on the host, and allow attackers to escalate privileges or move laterally within the network. Given Rancher's widespread use in cloud-native environments, the vulnerability poses a significant risk to cloud service providers, enterprises running Kubernetes clusters, and managed service providers. The critical CVSS score reflects the high likelihood of exploitation and the extensive damage possible, including full system compromise. Organizations may face operational downtime, data loss, regulatory penalties, and reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2025-62878, organizations should immediately restrict access to Rancher management interfaces to trusted administrators only, enforcing the principle of least privilege. Implement strict validation and sanitization of all user-supplied input parameters, especially pathPattern, to prevent path traversal. Monitor and audit PersistentVolume creation requests for suspicious or anomalous path patterns. Employ host-based intrusion detection systems to detect unauthorized file modifications. Until an official patch is released, consider isolating Rancher nodes and limiting network exposure. Regularly update Rancher to the latest versions once patches are available. Additionally, implement robust role-based access control (RBAC) policies within Rancher to minimize the number of users with privileges to create PersistentVolumes. Backup critical data and configurations frequently to enable recovery in case of compromise. Engage with SUSE support channels for updates and advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2025-10-24T10:34:22.765Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699ed8e3b7ef31ef0bfe58fe

Added to database: 2/25/2026, 11:11:31 AM

Last enriched: 2/25/2026, 11:26:11 AM

Last updated: 2/25/2026, 1:38:26 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats