CVE-2020-1726
Podman vulnerability analysis and mitigation

Overview

CVE-2020-1726 is a security vulnerability discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. This vulnerability was introduced in version 1.6.0 and affects systems using Podman for container management (NVD, Red Hat CVE).

Technical details

The vulnerability exists in the mountNamedVolume() function, which is responsible for copying the content of the destination volume directory from the container to the volume. The copy operation occurs only during the first use when vol.state.NeedsCopyUp is True, after which the field is set to False. Unlike Docker, which checks if a volume is empty before copying data, Podman did not implement this verification, allowing malicious containers to overwrite existing volume data (Bugzilla). The vulnerability has a CVSS v3.1 Base Score of 5.9 (Medium) with vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N (NVD).

Impact

When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume, even if the volume is mounted as read-only. This could lead to data corruption or manipulation of sensitive files (NVD).

Mitigation and workarounds

As a temporary mitigation, if a volume needs to be attached as read-only to an untrusted container or container image, first attach it to a trusted container. Using the volume for the first time will prevent the attack for other containers that are going to use the volume. The issue has been fixed in subsequent releases through Red Hat's security updates RHSA-2020:0680 and RHSA-2020:1650 (Bugzilla).

Additional resources


SourceThis report was generated using AI

Related Podman vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66506HIGH7.5
  • PodmanPodman
  • container-tools:rhel8::podman-catatonit
NoYesDec 04, 2025
CVE-2025-65637HIGH7.5
  • cAdvisorcAdvisor
  • toolbox-tests
NoYesDec 04, 2025
CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • rancher-fleet
NoYesDec 02, 2025
CVE-2025-67499MEDIUM6.6
  • DockerDocker
  • calico-3.30
NoYesDec 10, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • etcd-3.5
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management