* Write to /var/lib/rancher/ to tamper with cluster state.
* If hostPath volumes are mounted, write to the host node filesystem.
* Use this issue to chain with other attack vectors.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5v3h-x4wf-5c35 | Rancher Extensions have arbitrary file access via path traversal |
Wed, 13 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Suse
Suse rancher |
|
| Vendors & Products |
Suse
Suse rancher |
Wed, 13 May 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A malicious UI extension could abuse that to: * Overwrite Rancher binaries or configuration to inject code. * Write to /var/lib/rancher/ to tamper with cluster state. * If hostPath volumes are mounted, write to the host node filesystem. * Use this issue to chain with other attack vectors. | |
| Title | Rancher Extensions have arbitrary file access via path traversal | |
| Weaknesses | CWE-35 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2026-05-14T03:55:59.252Z
Reserved: 2026-02-05T15:37:24.184Z
Link: CVE-2026-25705
Updated: 2026-05-13T10:48:07.203Z
Status : Awaiting Analysis
Published: 2026-05-13T08:16:16.083
Modified: 2026-05-13T15:35:35.267
Link: CVE-2026-25705
No data.
OpenCVE Enrichment
Updated: 2026-05-13T09:30:26Z
Github GHSA