CVE-2025-9566
📋 TL;DR
A path traversal vulnerability in Podman's kube play command allows attackers to overwrite arbitrary host files when Kubernetes YAML files contain symbolic links in Secret or ConfigMap volume mounts. This affects Podman users who run untrusted Kubernetes YAML files or have insufficient container isolation.
💻 Affected Systems
- podman
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Critical system files could be overwritten, potentially leading to denial of service, privilege escalation, or system compromise if sensitive files are corrupted.
Likely Case
Local file corruption or denial of service affecting containerized applications, potentially disrupting services running on the host.
If Mitigated
Minimal impact if only trusted YAML files are used and proper container isolation is enforced.
🎯 Exploit Status
Requires ability to execute podman commands and provide malicious YAML files. Attacker controls target file path but not content.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v5.6.1
Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:15900
Restart Required: No
Instructions:
1. Update podman to version 5.6.1 or later. 2. For Red Hat systems: 'sudo yum update podman' or 'sudo dnf update podman'. 3. Verify update with 'podman --version'.
🔧 Temporary Workarounds
Restrict kube play usage
linuxLimit podman kube play command usage to trusted users and audit YAML files for symbolic links in volume mounts.
# Implement access controls via sudoers or RBAC
# Example: restrict podman commands to specific users
Use container isolation
linuxRun podman with user namespaces or rootless mode to limit host file system access.
podman kube play --userns=keep-id
systemctl --user start podman.socket
🧯 If You Can't Patch
- Audit all Kubernetes YAML files used with podman kube play for symbolic links in Secret/ConfigMap volume mounts.
- Implement strict access controls: only allow trusted users to execute podman commands and validate YAML files before execution.
🔍 How to Verify
Check if Vulnerable:
Check podman version: if between v4.0.0 and v5.6.0 inclusive, system is vulnerable.
Check Version:
podman --version
Verify Fix Applied:
Confirm podman version is 5.6.1 or later with 'podman --version'.
📡 Detection & Monitoring
Log Indicators:
- Unusual podman kube play commands with custom YAML files
- File modification errors in system logs from podman processes
Network Indicators:
- N/A - local exploitation only
SIEM Query:
source="podman" AND "kube play" AND ("error" OR "permission denied")
🔗 References
- https://access.redhat.com/errata/RHBA-2025:15692
- https://access.redhat.com/errata/RHBA-2025:15712
- https://access.redhat.com/errata/RHBA-2025:16158
- https://access.redhat.com/errata/RHBA-2025:16163
- https://access.redhat.com/errata/RHEA-2025:4782
- https://access.redhat.com/errata/RHSA-2025:15900
- https://access.redhat.com/errata/RHSA-2025:15901
- https://access.redhat.com/errata/RHSA-2025:15904
- https://access.redhat.com/errata/RHSA-2025:16480
- https://access.redhat.com/errata/RHSA-2025:16481
- https://access.redhat.com/errata/RHSA-2025:16482
- https://access.redhat.com/errata/RHSA-2025:16488
- https://access.redhat.com/errata/RHSA-2025:16515
- https://access.redhat.com/errata/RHSA-2025:16724
- https://access.redhat.com/errata/RHSA-2025:17669
- https://access.redhat.com/errata/RHSA-2025:18217
- https://access.redhat.com/errata/RHSA-2025:18218
- https://access.redhat.com/errata/RHSA-2025:18240
- https://access.redhat.com/errata/RHSA-2025:19002
- https://access.redhat.com/errata/RHSA-2025:19041
- https://access.redhat.com/errata/RHSA-2025:19046
- https://access.redhat.com/errata/RHSA-2025:19094
- https://access.redhat.com/errata/RHSA-2025:19894
- https://access.redhat.com/errata/RHSA-2025:20909
- https://access.redhat.com/errata/RHSA-2025:20983
- https://access.redhat.com/security/cve/CVE-2025-9566
- https://bugzilla.redhat.com/show_bug.cgi?id=2393152