Vulnerability Description
A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A malicious UI extension could abuse that to: * Overwrite Rancher binaries or configuration to inject code. * Write to /var/lib/rancher/ to tamper with cluster state. * If hostPath volumes are mounted, write to the host node filesystem. * Use this issue to chain with other attack vectors.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2026-25705
- https://github.com/rancher/rancher/security/advisories/GHSA-5v3h-x4wf-5c35
FAQ
What is CVE-2026-25705?
CVE-2026-25705 is a vulnerability with a CVSS score of 8.4 (HIGH). A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher throug...
How severe is CVE-2026-25705?
CVE-2026-25705 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25705?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.