
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A critical Time-of-Check to Time-of-Use (TOCTOU) vulnerability was discovered in containerd version 2.1.0, tracked as CVE-2025-47290. Containerd, an industry-standard container runtime used in Kubernetes and Docker environments, is responsible for core container lifecycle operations including image storage, transfer, execution, and network management. The vulnerability was discovered in May 2025 and has been patched in version 2.1.1 (Containerd Advisory, Security Online).
The vulnerability is a Time-of-Check to Time-of-Use (TOCTOU) flaw that occurs during the image unpacking process. During an image pull operation, specially crafted container images could manipulate symlinks or paths to write outside the container's intended boundaries. The vulnerability has been assigned a CVSS v4.0 score of 7.6 HIGH with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U (NVD).
When exploited, this vulnerability allows malicious container images to gain unauthorized access to the host filesystem, potentially overwriting critical host files. This is particularly dangerous in production container deployments where image pulls happen automatically and frequently (Security Online).
The vulnerability has been patched in containerd version 2.1.1. Users are strongly advised to update to this version. As a temporary workaround, organizations should ensure that only trusted images are used and that only trusted users have permissions to import images (Containerd Advisory).
The containerd project has acknowledged the contribution of Tõnis Tiigi for responsibly disclosing this issue in accordance with the containerd security policy (Containerd Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”