GHSA-gv8h-7v7w-r22q

Suggest an improvement
Source
https://github.com/advisories/GHSA-gv8h-7v7w-r22q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-gv8h-7v7w-r22q/GHSA-gv8h-7v7w-r22q.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gv8h-7v7w-r22q
Aliases
Published
2025-10-27T20:19:34Z
Modified
2025-11-27T09:09:37.102197Z
Severity
  • 8.9 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
Docker Compose Vulnerable to Path Traversal via OCI Artifact Layer Annotations
Details

Docker Compose trusts the path information embedded in remote OCI compose artifacts. When a layer includes the annotations com.docker.compose.extends or com.docker.compose.envfile, Compose joins the attacker‑supplied value from com.docker.compose.file/com.docker.compose.envfile with its local cache directory and writes the file there.

Impact

This affects any platform or workflow that resolves remote OCI compose artifacts, Docker Desktop, standalone Compose binaries on Linux, CI/CD runners, cloud dev environments is affected. An attacker can escape the cache directory and overwrite arbitrary files on the machine running docker compose, even if the user only runs read‑only commands such as docker compose config or docker compose ps.

Patches

v2.40.2

Workarounds

NA

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2025-10-27T20:19:34Z",
    "nvd_published_at": "2025-10-27T21:15:38Z",
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-20",
        "CWE-22"
    ]
}
References

Affected packages

Go / github.com/docker/compose/v2

Package

Name
github.com/docker/compose/v2
View open source insights on deps.dev
Purl
pkg:golang/github.com/docker/compose/v2

Affected ranges

Type
SEMVER
Events
Introduced
2.34.0
Fixed
2.40.2