CVE-2026-25705
HIGH
8,4
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: required
Scope: changed
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A malicious UI extension could abuse that to: * Overwrite Rancher binaries or configuration to inject code.
* Write to /var/lib/rancher/ to tamper with cluster state.
* If hostPath volumes are mounted, write to the host node filesystem.
* Use this issue to chain with other attack vectors.
35
Path Traversal: '.../...//'
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Potential Impacts:
Read Files Or Directories
Modify Files Or Directories
Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2026-25705
https://github.com/rancher/rancher/security/advisories/GHSA-5v3h-x4wf-5c35