CVE-2025-49593

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-49593
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-49593.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-49593
Aliases
  • GHSA-h5jw-8c32-xfv6
Published
2025-06-17T22:15:49Z
Modified
2025-06-18T14:43:53.696333Z
Summary
[none]
Details

Portainer Community Edition is a lightweight service delivery platform for containerized applications that can be used to manage Docker, Swarm, Kubernetes and ACI environments. Prior to STS version 2.31.0 and LTS version 2.27.7, if a Portainer administrator can be convinced to register a malicious container registry, or an existing container registry can be taken over, HTTP Headers (including registry authentication credentials or Portainer session tokens) may be leaked to that registry. This issue has been patched in STS version 2.31.0 and LTS version 2.27.7.

References

Affected packages

Git / github.com/portainer/portainer

Affected ranges

Type
GIT
Repo
https://github.com/portainer/portainer
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.1.0
1.10.0
1.10.1
1.10.2
1.11.0
1.11.1
1.11.2
1.11.3
1.11.4
1.12.0
1.12.1
1.12.2
1.12.3
1.12.4
1.13.0
1.13.1
1.13.2
1.13.3
1.13.4
1.13.5
1.13.6
1.14.0
1.14.1
1.14.2
1.14.3
1.15.0
1.15.1
1.15.2
1.15.3
1.15.4
1.15.5
1.16.0
1.16.1
1.16.2
1.16.3
1.16.4
1.16.5
1.17.0
1.17.1
1.18.0
1.18.1
1.19.0
1.19.1
1.19.2
1.2.0
1.20.0
1.20.1
1.20.2
1.21.0
1.22.0
1.22.1
1.23.0
1.23.1
1.23.2
1.24.0
1.3.0
1.4.0
1.5.0
1.6.0
1.7.0
1.8.0
1.8.1
1.9.0
1.9.1
1.9.2
1.9.3

2.*

2.0.0
2.23.0

internal-1.*

internal-1.2.0
internal-1.3.0
internal-1.4.0
internal-1.5.0
internal-1.6.0

v0.*

v0.5
v0.6.0