Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9566: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

0
High
VulnerabilityCVE-2025-9566cvecve-2025-9566
Published: Fri Sep 05 2025 (09/05/2025, 19:54:30 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 01:48:49 UTC

Technical Analysis

CVE-2025-9566 is a path traversal vulnerability affecting Podman, a popular container management tool used widely in Linux environments, including Red Hat Enterprise Linux 10. Introduced in Podman version 4.0.0 and fixed in version 5.6.1, this vulnerability arises when the 'kube play' command processes Kubernetes manifests that include Secrets or ConfigMaps mounted as volumes. If such a volume contains symbolic links pointing to host file paths, an attacker with at least limited privileges can exploit this to overwrite arbitrary files on the host system. The vulnerability does not allow control over the content written, only the target file path, which still poses a significant risk to system integrity and availability. The attack vector is network accessible but requires privileges (PR:L) and no user interaction (UI:N). The CVSS 3.1 base score is 8.1, reflecting high severity due to the potential for high impact on integrity and availability without confidentiality loss. No known exploits have been reported in the wild yet, but the vulnerability's nature makes it a critical concern for containerized environments relying on Podman, especially in Kubernetes orchestration scenarios where Secrets and ConfigMaps are commonly used. The flaw highlights the risks of symbolic link handling in container volume mounts and the importance of strict path validation.

Potential Impact

The primary impact of CVE-2025-9566 is on the integrity and availability of host systems running vulnerable Podman versions. By overwriting arbitrary host files, attackers can disrupt system services, corrupt critical configuration files, or disable security controls, potentially leading to denial of service or facilitating further attacks. Although the attacker cannot control the file content, overwriting key files can cause unpredictable system behavior or crash services. This vulnerability is particularly impactful in environments where Podman is used to deploy Kubernetes workloads with Secrets or ConfigMaps, as these are common mechanisms for managing sensitive data and configuration. Organizations relying on Podman for container orchestration or development may face increased risk of system compromise or operational disruption. The requirement for limited privileges means that attackers must already have some level of access, but the vulnerability significantly escalates their ability to affect the host system. Given the widespread use of Red Hat Enterprise Linux and Podman in enterprise and cloud environments, the potential impact is broad and severe.

Mitigation Recommendations

To mitigate CVE-2025-9566, organizations should upgrade Podman to version 5.6.1 or later, where the vulnerability is fixed. Until upgrading, administrators should restrict access to the 'kube play' command and limit user privileges to prevent exploitation. Review and audit Kubernetes manifests, especially those mounting Secrets or ConfigMaps as volumes, to ensure they do not contain symbolic links pointing to sensitive host paths. Implement strict validation and sanitization of volume mounts and symbolic links in container configurations. Employ host-based file integrity monitoring to detect unauthorized file overwrites. Additionally, consider isolating container workloads and enforcing least privilege principles to reduce the risk of privilege escalation. Regularly monitor security advisories from Red Hat and Podman maintainers for updates or patches. Finally, conduct penetration testing and vulnerability assessments focusing on container orchestration components to identify and remediate similar risks proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-08-27T22:17:43.489Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb425f535f4a97730e492e

Added to database: 9/5/2025, 8:04:47 PM

Last enriched: 3/20/2026, 1:48:49 AM

Last updated: 3/25/2026, 3:27:23 PM

Views: 157

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses