CVE-2025-62878

9.9 CRITICAL

📋 TL;DR

This CVE allows attackers to manipulate PersistentVolume path patterns to create volumes in arbitrary host node locations, potentially overwriting sensitive files or accessing unauthorized directories. It affects Kubernetes environments where users can create PersistentVolumes, particularly in multi-tenant clusters.

💻 Affected Systems

Products:
  • Kubernetes
  • Kubernetes-based platforms
Versions: Specific versions TBD - check vendor advisories
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects clusters where users have permissions to create PersistentVolumes. Multi-tenant environments are particularly at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete host node compromise leading to data destruction, credential theft, and lateral movement to other cluster components.

🟠

Likely Case

Unauthorized access to sensitive host files, potential data exfiltration, and disruption of node operations.

🟢

If Mitigated

Limited impact through proper RBAC restrictions and network segmentation, though path traversal risk remains.

🌐 Internet-Facing: MEDIUM - Requires authenticated access to Kubernetes API, but exposed clusters with weak authentication are vulnerable.
🏢 Internal Only: HIGH - Internal attackers with standard Kubernetes permissions can exploit this to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Kubernetes API with PersistentVolume creation permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor-specific releases (e.g., Kubernetes 1.30.x+, Rancher, OpenShift specific versions)

Vendor Advisory: https://github.com/advisories/GHSA-jr3w-9vfr-c746

Restart Required: Yes

Instructions:

1. Check your Kubernetes distribution's security advisory. 2. Update to patched version. 3. Restart affected components. 4. Validate fix with test deployments.

🔧 Temporary Workarounds

Restrict PersistentVolume Creation

linux

Limit PersistentVolume creation permissions using RBAC to trusted users only.

kubectl create clusterrole restricted-pv-creator --verb=create --resource=persistentvolumes
kubectl create clusterrolebinding pv-creator-binding --clusterrole=restricted-pv-creator --user=trusted-user

Implement Admission Control

linux

Use validating admission webhooks to restrict pathPattern values in PersistentVolume manifests.

# Implement custom admission controller or use OPA/Gatekeeper policies

🧯 If You Can't Patch

  • Implement strict RBAC controls to limit PersistentVolume creation to essential administrators only.
  • Deploy network policies to segment Kubernetes API server and monitor for suspicious PersistentVolume creation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if your Kubernetes version is in affected range and test creating a PersistentVolume with manipulated pathPattern.

Check Version:

kubectl version --short

Verify Fix Applied:

After patching, attempt to create a PersistentVolume with malicious pathPattern - should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • Kubernetes API server logs showing PersistentVolume creation with unusual pathPattern values
  • Audit logs with persistentvolume create events containing path traversal patterns

Network Indicators:

  • Unusual API calls to create PersistentVolumes from non-admin users
  • Increased volume creation requests

SIEM Query:

source="kubernetes-api" action="create" resource="persistentvolumes" | search pathPattern="*../*"

🔗 References

📤 Share & Export