CVE-2026-25499: CWE-1188: Insecure Default Initialization of Resource in bpg terraform-provider-proxmox
CVE-2026-25499 is a high-severity vulnerability in the terraform-provider-proxmox before version 0. 93. 1. It arises from insecure default sudoer configuration in the SSH setup documentation, allowing directory traversal via '.. /' sequences. This flaw enables unauthorized editing of arbitrary files on the host system without authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 8. 7, indicating a critical risk to confidentiality and integrity. The issue was patched in version 0.
AI Analysis
Technical Summary
CVE-2026-25499 identifies a critical vulnerability in the terraform-provider-proxmox, a Terraform (and OpenTofu) provider that facilitates managing Proxmox Virtual Environment resources. Prior to version 0.93.1, the SSH configuration documentation recommended a sudoer line that was insecurely configured. This insecure sudoer setup allows an attacker to exploit directory traversal sequences ('../') to escape the intended directory context. As a result, an attacker can edit arbitrary files on the underlying system, potentially leading to full system compromise or data manipulation. The vulnerability is categorized under CWE-1188 (Insecure Default Initialization of Resource) and CWE-22 (Path Traversal). The CVSS 4.0 vector indicates the attack can be performed remotely without authentication or user interaction, with a high impact on confidentiality and integrity but no impact on availability. Although no known exploits are currently in the wild, the ease of exploitation and severity warrant immediate attention. The issue was addressed and patched in version 0.93.1 of the provider, which corrects the sudoer configuration to prevent directory traversal attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those leveraging Proxmox VE for virtualization and managing it via Terraform providers. Exploitation could allow attackers to modify critical system files, leading to unauthorized access, data breaches, or disruption of virtualized environments. This could impact sectors such as finance, healthcare, government, and critical infrastructure where Proxmox is deployed. The ability to perform such attacks remotely without authentication increases the threat surface. Compromise of virtualization management tools can cascade into broader network compromises, affecting confidentiality and integrity of sensitive data and services. Given the high CVSS score and the nature of the vulnerability, organizations face potential regulatory and operational risks if exploited.
Mitigation Recommendations
Organizations should immediately upgrade terraform-provider-proxmox to version 0.93.1 or later to apply the official patch. Review and harden sudoer configurations used in SSH setups to ensure they do not allow directory traversal or excessive privileges. Limit SSH access to trusted administrators and enforce strict access controls. Implement monitoring and alerting for unusual file modifications on systems running Proxmox and Terraform providers. Conduct audits of infrastructure-as-code configurations to detect insecure defaults. Employ network segmentation to isolate management interfaces. Additionally, educate DevOps and security teams about secure provider configurations and the risks of insecure sudoer lines. Regularly update and patch infrastructure management tools to minimize exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-25499: CWE-1188: Insecure Default Initialization of Resource in bpg terraform-provider-proxmox
Description
CVE-2026-25499 is a high-severity vulnerability in the terraform-provider-proxmox before version 0. 93. 1. It arises from insecure default sudoer configuration in the SSH setup documentation, allowing directory traversal via '.. /' sequences. This flaw enables unauthorized editing of arbitrary files on the host system without authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 8. 7, indicating a critical risk to confidentiality and integrity. The issue was patched in version 0.
AI-Powered Analysis
Technical Analysis
CVE-2026-25499 identifies a critical vulnerability in the terraform-provider-proxmox, a Terraform (and OpenTofu) provider that facilitates managing Proxmox Virtual Environment resources. Prior to version 0.93.1, the SSH configuration documentation recommended a sudoer line that was insecurely configured. This insecure sudoer setup allows an attacker to exploit directory traversal sequences ('../') to escape the intended directory context. As a result, an attacker can edit arbitrary files on the underlying system, potentially leading to full system compromise or data manipulation. The vulnerability is categorized under CWE-1188 (Insecure Default Initialization of Resource) and CWE-22 (Path Traversal). The CVSS 4.0 vector indicates the attack can be performed remotely without authentication or user interaction, with a high impact on confidentiality and integrity but no impact on availability. Although no known exploits are currently in the wild, the ease of exploitation and severity warrant immediate attention. The issue was addressed and patched in version 0.93.1 of the provider, which corrects the sudoer configuration to prevent directory traversal attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those leveraging Proxmox VE for virtualization and managing it via Terraform providers. Exploitation could allow attackers to modify critical system files, leading to unauthorized access, data breaches, or disruption of virtualized environments. This could impact sectors such as finance, healthcare, government, and critical infrastructure where Proxmox is deployed. The ability to perform such attacks remotely without authentication increases the threat surface. Compromise of virtualization management tools can cascade into broader network compromises, affecting confidentiality and integrity of sensitive data and services. Given the high CVSS score and the nature of the vulnerability, organizations face potential regulatory and operational risks if exploited.
Mitigation Recommendations
Organizations should immediately upgrade terraform-provider-proxmox to version 0.93.1 or later to apply the official patch. Review and harden sudoer configurations used in SSH setups to ensure they do not allow directory traversal or excessive privileges. Limit SSH access to trusted administrators and enforce strict access controls. Implement monitoring and alerting for unusual file modifications on systems running Proxmox and Terraform providers. Conduct audits of infrastructure-as-code configurations to detect insecure defaults. Employ network segmentation to isolate management interfaces. Additionally, educate DevOps and security teams about secure provider configurations and the risks of insecure sudoer lines. Regularly update and patch infrastructure management tools to minimize exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T18:21:42.485Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6983afd6f9fa50a62fabdb3a
Added to database: 2/4/2026, 8:45:10 PM
Last enriched: 2/4/2026, 9:00:00 PM
Last updated: 2/4/2026, 9:55:07 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25538: CWE-862: Missing Authorization in devtron-labs devtron
HighCVE-2026-25537: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Keats jsonwebtoken
MediumCVE-2026-25536: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in modelcontextprotocol typescript-sdk
HighCVE-2026-25526: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in HubSpot jinjava
CriticalCVE-2026-1884: Server-Side Request Forgery in ZenTao
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.