Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-62878— Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern

CVSS 9.9 · Critical EPSS 0.03% · P9
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-62878

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern
Source: NVD (National Vulnerability Database)
Vulnerability Description
A malicious user can manipulate the parameters.pathPattern to create PersistentVolumes in arbitrary locations on the host node, potentially overwriting sensitive files or gaining access to unintended directories.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
相对路径遍历
Source: NVD (National Vulnerability Database)
Vulnerability Title
SUSE Rancher 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SUSE Rancher是德国SUSE公司的一个Kubernetes管理平台。 SUSE Rancher存在安全漏洞,该漏洞源于攻击者可操纵parameters.pathPattern在主机节点任意位置创建PersistentVolumes,可能导致覆盖敏感文件或访问非预期目录。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
SUSERancher 0 ~ 0.0.34 -

II. Public POCs for CVE-2025-62878

#POC DescriptionSource LinkShenlong Link
1CVE-2025-62878https://github.com/kinokopio/CVE-2025-62878POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-62878

登录查看更多情报信息。

Same Patch Batch · SUSE · 2026-02-25 · 3 CVEs total

CVE-2025-676018.3 HIGHRancher CLI skips TLS verification on Rancher CLI login command
CVE-2025-678603.8 LOWNeuVector scanner insecurely handles passwords as command arguments

IV. Related Vulnerabilities

V. Comments for CVE-2025-62878

No comments yet


Leave a comment