Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26380 | A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of openSUSE Tumbleweed traefik2 allows the traefik user to escalate to root. This issue affects Tumbleweed: from ? before 2.11.29. |
Wed, 03 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensuse
Opensuse tumbleweed |
|
| Vendors & Products |
Opensuse
Opensuse tumbleweed |
Wed, 03 Sep 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | traefik: Escalation to root from traefik user via %post script | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 02 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of openSUSE Tumbleweed traefik2 allows the traefik user to escalate to root. This issue affects Tumbleweed: from ? before 2.11.29. | |
| Weaknesses | CWE-61 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2026-02-26T17:49:54.935Z
Reserved: 2025-04-30T11:28:04.728Z
Link: CVE-2025-46810
Updated: 2025-09-02T13:33:29.303Z
Status : Deferred
Published: 2025-09-02T12:15:36.250
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-46810
OpenCVE Enrichment
Updated: 2025-09-03T19:30:36Z
EUVD