Vulnerability Description
Portainer Community Edition is a lightweight service delivery platform for containerized applications that can be used to manage Docker, Swarm, Kubernetes and ACI environments. Prior to STS version 2.31.0 and LTS version 2.27.7, if a Portainer administrator can be convinced to register a malicious container registry, or an existing container registry can be taken over, HTTP Headers (including registry authentication credentials or Portainer session tokens) may be leaked to that registry. This issue has been patched in STS version 2.31.0 and LTS version 2.27.7.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/portainer/portainer/commit/384cb53c64af78af8e1ac7ef5b0f91bad5
- https://github.com/portainer/portainer/commit/b767dcb27ed253b423facd2e04ef971985
- https://github.com/portainer/portainer/security/advisories/GHSA-h5jw-8c32-xfv6
FAQ
What is CVE-2025-49593?
CVE-2025-49593 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Portainer Community Edition is a lightweight service delivery platform for containerized applications that can be used to manage Docker, Swarm, Kubernetes and ACI environments. Prior to STS version 2....
How severe is CVE-2025-49593?
CVE-2025-49593 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-49593?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.