Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-31133

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-06 Nov, 2025 | 18:47
Updated At-06 Nov, 2025 | 19:22
Rejected At-
Credits

runc container escape via "masked path" abuse due to mount race conditions

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:06 Nov, 2025 | 18:47
Updated At:06 Nov, 2025 | 19:22
Rejected At:
▼CVE Numbering Authority (CNA)
runc container escape via "masked path" abuse due to mount race conditions

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

Affected Products
Vendor
opencontainers
Product
runc
Versions
Affected
  • < 1.2.8
  • >= 1.3.0-rc.1, < 1.3.3
  • >= 1.4.0-rc.1, <= 1.4.0-rc.3
Problem Types
TypeCWE IDDescription
CWECWE-61CWE-61: UNIX Symbolic Link (Symlink) Following
CWECWE-363CWE-363: Race Condition Enabling Link Following
Type: CWE
CWE ID: CWE-61
Description: CWE-61: UNIX Symbolic Link (Symlink) Following
Type: CWE
CWE ID: CWE-363
Description: CWE-363: Race Condition Enabling Link Following
Metrics
VersionBase scoreBase severityVector
4.07.3HIGH
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Version: 4.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
x_refsource_CONFIRM
https://github.com/opencontainers/runc/commit/1a30a8f3d921acbbb6a4bb7e99da2c05f8d48522
x_refsource_MISC
https://github.com/opencontainers/runc/commit/5d7b2424072449872d1cd0c937f2ca25f418eb66
x_refsource_MISC
https://github.com/opencontainers/runc/commit/8476df83b534a2522b878c0507b3491def48db9f
x_refsource_MISC
https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/opencontainers/runc/commit/1a30a8f3d921acbbb6a4bb7e99da2c05f8d48522
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/5d7b2424072449872d1cd0c937f2ca25f418eb66
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/8476df83b534a2522b878c0507b3491def48db9f
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:06 Nov, 2025 | 19:15
Updated At:03 Dec, 2025 | 18:30

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.3HIGH
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CPE Matches

The Linux Foundation
linuxfoundation
>>runc>>Versions before 1.2.8(exclusive)
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
The Linux Foundation
linuxfoundation
>>runc>>Versions from 1.3.0(inclusive) to 1.3.3(exclusive)
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
The Linux Foundation
linuxfoundation
>>runc>>1.4.0
cpe:2.3:a:linuxfoundation:runc:1.4.0:rc1:*:*:*:*:*:*
The Linux Foundation
linuxfoundation
>>runc>>1.4.0
cpe:2.3:a:linuxfoundation:runc:1.4.0:rc2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-61Primarysecurity-advisories@github.com
CWE-363Primarysecurity-advisories@github.com
CWE ID: CWE-61
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-363
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/opencontainers/runc/commit/1a30a8f3d921acbbb6a4bb7e99da2c05f8d48522security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/5d7b2424072449872d1cd0c937f2ca25f418eb66security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/8476df83b534a2522b878c0507b3491def48db9fsecurity-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64security-advisories@github.com
Patch
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2security-advisories@github.com
Patch
Third Party Advisory
Mitigation
Hyperlink: https://github.com/opencontainers/runc/commit/1a30a8f3d921acbbb6a4bb7e99da2c05f8d48522
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/5d7b2424072449872d1cd0c937f2ca25f418eb66
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/8476df83b534a2522b878c0507b3491def48db9f
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Mitigation

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2025-52881
Matching Score-10
Assigner-GitHub, Inc.
ShareView Details
Matching Score-10
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.03% / 9.24%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 20:23
Updated-03 Dec, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
runc: LSM labels can be bypassed with malicious config using dummy procfs files

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.

Action-Not Available
Vendor-opencontainersThe Linux Foundation
Product-runcrunc
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2023-43637
Matching Score-8
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Matching Score-8
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.31%
||
7 Day CHG~0.00%
Published-21 Sep, 2023 | 13:20
Updated-24 Sep, 2024 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vault Key Partially Predetermined

Due to the implementation of "deriveVaultKey", prior to version 7.10, the generated vault key would always have the last 16 bytes predetermined to be "arfoobarfoobarfo". This issue happens because "deriveVaultKey" calls "retrieveCloudKey" (which will always return "foobarfoobarfoobarfoobarfoobarfo" as the key), and then merges the 32byte randomly generated key with this key (by takeing 16bytes from each, see "mergeKeys"). This makes the key a lot weaker. This issue does not persist in devices that were initialized on/after version 7.10, but devices that were initialized before that and updated to a newer version still have this issue. Roll an update that enforces the full 32bytes key usage.

Action-Not Available
Vendor-lfedgeLF-Edge, ZededaThe Linux Foundation
Product-eveEVE OSedge_virtualization_engine
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-52565
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-8.4||HIGH
EPSS-0.02% / 4.47%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 20:02
Updated-03 Dec, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
container escape due to /dev/console mount and related races

runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

Action-Not Available
Vendor-opencontainersThe Linux Foundation
Product-runcrunc
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2024-45310
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-3.6||LOW
EPSS-0.15% / 35.47%
||
7 Day CHG~0.00%
Published-03 Sep, 2024 | 19:07
Updated-25 Nov, 2025 | 14:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
runc can be confused to create empty files/directories on the host

runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in runc v1.1.14 and v1.2.0-rc3. Some workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual user on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested.

Action-Not Available
Vendor-opencontainersThe Linux Foundation
Product-runcrunc
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2025-66431
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.82%
||
7 Day CHG~0.00%
Published-03 Dec, 2025 | 00:00
Updated-04 Dec, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebPros Plesk before 18.0.73.5 and 18.0.74 before 18.0.74.2 on Linux allows remote authenticated users to execute arbitrary code as root via domain creation. The attacker needs "Create and manage sites" with "Domains management" and "Subdomains management."

Action-Not Available
Vendor-Plesk (WebPros International GmbH)
Product-Plesk
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2025-62161
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.05% / 15.37%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 23:09
Updated-10 Nov, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
youki container escape via "masked path" abuse due to mount race conditions

Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.

Action-Not Available
Vendor-youki-devyouki-dev
Product-youkiyouki
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2025-62596
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.05% / 15.28%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 23:14
Updated-10 Nov, 2025 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

Action-Not Available
Vendor-youki-devyouki-dev
Product-youkiyouki
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
Details not found