Rancher Extensions Path Traversal Vulnerability
A path traversal vulnerability (CVE-2026-25705) exists in Rancher's Extensions through the `compressedEndpoint` field in a `UIPlugin` deployment, allowing malicious UI extensions to overwrite Rancher binaries, tamper with cluster state, or write to the host filesystem.
A path traversal vulnerability has been identified in Rancher’s Extensions, specifically affecting versions prior to v2.14.1, v2.13.5, v2.12.9, and v2.11.13. The vulnerability resides in the compressedEndpoint field within a UIPlugin deployment. A malicious actor could craft a UI extension containing a path traversal sequence, allowing them to manipulate files outside of the intended directory. This can be achieved by exploiting the installation process of UI plugins, where the compressedEndpoint field is not properly validated against path traversal attacks. Successfully exploiting this vulnerability could lead to arbitrary code execution within the Rancher management plane, compromising cluster infrastructure.
Attack Chain
- An attacker crafts a malicious UI extension containing a crafted
index.yamlfile. - The malicious
index.yamlincludes acompressedEndpointwith a path traversal sequence (e.g.,../../). - An administrator (or a user with sufficient privileges) installs the malicious UI extension through the Rancher UI or API.
- During the installation process, Rancher attempts to retrieve the compressed extension from the specified endpoint.
- Due to the path traversal vulnerability, the attacker can write to arbitrary file system locations.
- The attacker overwrites a Rancher binary or configuration file with malicious code.
- The attacker could also write to
/var/lib/rancher/to tamper with cluster state, or write to the host node filesystem ifhostPathvolumes are mounted. - The malicious code executes, granting the attacker control over the Rancher instance and potentially the underlying Kubernetes clusters.
Impact
Successful exploitation of this vulnerability allows an attacker to achieve arbitrary code execution on the Rancher management plane. This could lead to a complete compromise of the Rancher instance and the connected Kubernetes clusters. An attacker could potentially gain access to sensitive information, such as cluster credentials and application data. The affected versions include Rancher versions v2.14.0, v2.13.0-v2.13.4, v2.12.0-v2.12.8, v2.10.11-v2.11.12.
Recommendation
- Upgrade Rancher to a patched version (v2.14.1, v2.13.5, v2.12.9, or v2.11.13) to remediate the vulnerability as described in the advisory.
- Implement strict controls on who can deploy UI extensions, as mentioned in the overview.
- Monitor Rancher logs for suspicious activity related to UI extension installations.
- Deploy the Sigma rule
Detect Suspicious CompressedEndpoint Path Traversalto detect exploitation attempts.
Detection coverage 2
Detect Suspicious CompressedEndpoint Path Traversal
highDetects attempts to exploit the path traversal vulnerability in Rancher's compressedEndpoint field within UIPlugin deployments by identifying '..' sequences in the compressedEndpoint URL.
Detect UIPlugin CR Modification with Suspicious Path
mediumDetects attempts to create or modify UIPlugin custom resources with a suspicious path in the compressedEndpoint field, indicating potential path traversal.
Detection queries are kept inside the platform. Get full rules →