CVE-2025-9566: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Red Hat Red Hat Enterprise Linux 10
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1
AI Analysis
Technical Summary
CVE-2025-9566 is a high-severity path traversal vulnerability affecting the podman container management tool included in Red Hat Enterprise Linux 10. The flaw arises when an attacker uses the 'kube play' command with a Kubernetes file container that mounts a Secret or ConfigMap volume containing a symbolic link pointing to a host file path. Due to improper limitation of pathname resolution, the attacker can overwrite arbitrary files on the host system by leveraging the symbolic link within the volume mount. However, the attacker cannot control the content written to the target file, only the file path to be overwritten. This vulnerability was introduced in podman version 4.0.0 and fixed in version 5.6.1. The CVSS 3.1 base score is 8.1, reflecting high severity with network attack vector, low attack complexity, requiring privileges (PR:L), no user interaction, unchanged scope, no confidentiality impact, but high impact on integrity and availability. The vulnerability allows an attacker with some level of privileges on the container host to overwrite critical host files, potentially leading to denial of service or integrity compromise of system files. Although no known exploits are currently in the wild, the vulnerability poses a significant risk in environments where podman is used to run Kubernetes workloads with mounted Secrets or ConfigMaps that include symbolic links. The improper pathname limitation allows bypassing intended container isolation boundaries, undermining the security model of containerized workloads on Red Hat Enterprise Linux 10 systems.
Potential Impact
For European organizations, especially those leveraging containerized workloads with podman on Red Hat Enterprise Linux 10, this vulnerability could lead to serious operational disruptions. Attackers with limited privileges could overwrite critical host files, potentially causing system instability, denial of service, or enabling further privilege escalation. This risk is particularly acute in sectors with high container adoption such as finance, telecommunications, and government infrastructure. The inability to control file content limits some attack vectors, but the mere ability to overwrite files can disrupt system integrity and availability. Organizations running Kubernetes workloads with Secrets or ConfigMaps mounted as volumes containing symbolic links are at heightened risk. This vulnerability could also undermine compliance with data integrity and availability requirements under European regulations such as GDPR and NIS Directive, especially if critical infrastructure services are impacted.
Mitigation Recommendations
1. Upgrade podman to version 5.6.1 or later where the vulnerability is fixed. 2. Audit existing Kubernetes Secret and ConfigMap volume mounts for symbolic links that point outside the container filesystem and remove or replace them. 3. Implement strict container runtime security policies that restrict volume mounts containing symbolic links or untrusted content. 4. Employ file integrity monitoring on host systems to detect unauthorized file overwrites. 5. Limit privileges of users and processes that can invoke 'kube play' commands or manage podman containers to reduce attack surface. 6. Use container security tools to scan for misconfigurations and enforce best practices regarding volume mounts. 7. Monitor logs for suspicious podman activity related to volume mounts and file modifications. 8. Consider network segmentation and host-based intrusion detection to detect and contain exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2025-9566: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Red Hat Red Hat Enterprise Linux 10
Description
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1
AI-Powered Analysis
Technical Analysis
CVE-2025-9566 is a high-severity path traversal vulnerability affecting the podman container management tool included in Red Hat Enterprise Linux 10. The flaw arises when an attacker uses the 'kube play' command with a Kubernetes file container that mounts a Secret or ConfigMap volume containing a symbolic link pointing to a host file path. Due to improper limitation of pathname resolution, the attacker can overwrite arbitrary files on the host system by leveraging the symbolic link within the volume mount. However, the attacker cannot control the content written to the target file, only the file path to be overwritten. This vulnerability was introduced in podman version 4.0.0 and fixed in version 5.6.1. The CVSS 3.1 base score is 8.1, reflecting high severity with network attack vector, low attack complexity, requiring privileges (PR:L), no user interaction, unchanged scope, no confidentiality impact, but high impact on integrity and availability. The vulnerability allows an attacker with some level of privileges on the container host to overwrite critical host files, potentially leading to denial of service or integrity compromise of system files. Although no known exploits are currently in the wild, the vulnerability poses a significant risk in environments where podman is used to run Kubernetes workloads with mounted Secrets or ConfigMaps that include symbolic links. The improper pathname limitation allows bypassing intended container isolation boundaries, undermining the security model of containerized workloads on Red Hat Enterprise Linux 10 systems.
Potential Impact
For European organizations, especially those leveraging containerized workloads with podman on Red Hat Enterprise Linux 10, this vulnerability could lead to serious operational disruptions. Attackers with limited privileges could overwrite critical host files, potentially causing system instability, denial of service, or enabling further privilege escalation. This risk is particularly acute in sectors with high container adoption such as finance, telecommunications, and government infrastructure. The inability to control file content limits some attack vectors, but the mere ability to overwrite files can disrupt system integrity and availability. Organizations running Kubernetes workloads with Secrets or ConfigMaps mounted as volumes containing symbolic links are at heightened risk. This vulnerability could also undermine compliance with data integrity and availability requirements under European regulations such as GDPR and NIS Directive, especially if critical infrastructure services are impacted.
Mitigation Recommendations
1. Upgrade podman to version 5.6.1 or later where the vulnerability is fixed. 2. Audit existing Kubernetes Secret and ConfigMap volume mounts for symbolic links that point outside the container filesystem and remove or replace them. 3. Implement strict container runtime security policies that restrict volume mounts containing symbolic links or untrusted content. 4. Employ file integrity monitoring on host systems to detect unauthorized file overwrites. 5. Limit privileges of users and processes that can invoke 'kube play' commands or manage podman containers to reduce attack surface. 6. Use container security tools to scan for misconfigurations and enforce best practices regarding volume mounts. 7. Monitor logs for suspicious podman activity related to volume mounts and file modifications. 8. Consider network segmentation and host-based intrusion detection to detect and contain exploitation attempts early.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-08-27T22:17:43.489Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb425f535f4a97730e492e
Added to database: 9/5/2025, 8:04:47 PM
Last enriched: 9/5/2025, 8:05:14 PM
Last updated: 9/8/2025, 1:40:33 PM
Views: 25
Related Threats
CVE-2025-56630: n/a
UnknownCVE-2025-36853: CWE-190: Integer Overflow or Wraparound in Microsoft .NET 6.0
HighCVE-2025-36854: CWE-416: Use After Free in Microsoft .NET 6.0
HighCVE-2025-36855: CWE-126: Buffer Over-read in Microsoft .NET 6.0
HighCVE-2025-22956: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.