CVE-2026-25705

EUVD-2026-29915
A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A malicious UI extension could abuse that to:  *  Overwrite Rancher binaries or configuration to inject code.

  *  Write to /var/lib/rancher/ to tamper with cluster state.

  *  If hostPath volumes are mounted, write to the host node filesystem.

  *  Use this issue to chain with other attack vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
suseCNA
8.4 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
suserancher
2.14.0 ≤
𝑥
< 2.14.1
CNA
suserancher
2.13.0 ≤
𝑥
< 2.13.5
CNA
suserancher
2.12.0 ≤
𝑥
< 2.12.9
CNA
suserancher
2.10.11 ≤
𝑥
< 2.11.13
CNA