CVE-2026-25705

Published: Mag 13, 2026 Last Modified: Mag 13, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,4
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: required
Scope: changed
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A malicious UI extension could abuse that to: * Overwrite Rancher binaries or configuration to inject code.

* Write to /var/lib/rancher/ to tamper with cluster state.

* If hostPath volumes are mounted, write to the host node filesystem.

* Use this issue to chain with other attack vectors.

35

Path Traversal: '.../...//'

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity
Potential Impacts:
Read Files Or Directories Modify Files Or Directories Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
View CWE Details
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2026-25705
https://github.com/rancher/rancher/security/advisories/GHSA-5v3h-x4wf-5c35