CVE-2025-31133
Podman vulnerability analysis and mitigation

Overview

CVE-2025-31133 is a high-severity vulnerability discovered in runc's implementation of maskedPaths feature. The vulnerability was discovered in August 2025, affecting runc versions <=1.2.7, <=1.3.2, and <=1.4.0-rc.2. The issue involves a use-after-free vulnerability in the maskedPaths feature that allows attackers to potentially escape container isolation through mount race conditions (GitHub Advisory).

Technical details

The vulnerability stems from insufficient verification of the source of bind-mounts when using the container's /dev/null to mask files. When implementing the maskedPaths feature, runc failed to properly verify that the source of the bind-mount was actually a real /dev/null inode. The vulnerability has received a CVSS v4.0 score of 7.3 (High) with the vector CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H (GitHub Advisory).

Impact

The vulnerability can lead to two distinct attack scenarios: 1) Arbitrary Mount Gadget attack enabling host information disclosure, host denial of service, or container escape through bind-mounting of sensitive files like /proc/sysrq-trigger or /proc/sys/kernel/core_pattern, and 2) Complete bypass of maskedPaths protection, allowing access to sensitive host information from typically masked files in /proc (GitHub Advisory).

Mitigation and workarounds

Several mitigation strategies have been released: 1) Use containers with user namespaces where the host root user is not mapped into the container's user namespace, 2) Configure containers to not permit processes to run with root privileges, 3) Enable noNewPrivileges to disable setuid or set-capability binaries, 4) Avoid running untrusted container images from unknown sources. The vulnerability has been patched in runc versions 1.2.8, 1.3.3, and 1.4.0-rc.3 (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Podman vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-52565HIGH8.4
  • PodmanPodman
  • node-feature-discovery-0.18
NoYesNov 06, 2025
CVE-2025-61725HIGH7.5
  • cAdvisorcAdvisor
  • grafana-mimir-fips-2.16
NoYesOct 29, 2025
CVE-2025-52881HIGH7.3
  • DockerDocker
  • runc-debuginfo
NoYesNov 06, 2025
CVE-2025-31133HIGH7.3
  • PodmanPodman
  • buildah
NoYesNov 06, 2025
CVE-2025-61724MEDIUM5.3
  • cAdvisorcAdvisor
  • victoriametrics-cluster-fips
NoYesOct 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management