CVE-2025-47290
Docker Compose vulnerability analysis and mitigation

Overview

A critical Time-of-Check to Time-of-Use (TOCTOU) vulnerability was discovered in containerd version 2.1.0, tracked as CVE-2025-47290. Containerd, an industry-standard container runtime used in Kubernetes and Docker environments, is responsible for core container lifecycle operations including image storage, transfer, execution, and network management. The vulnerability was discovered in May 2025 and has been patched in version 2.1.1 (Containerd Advisory, Security Online).

Technical details

The vulnerability is a Time-of-Check to Time-of-Use (TOCTOU) flaw that occurs during the image unpacking process. During an image pull operation, specially crafted container images could manipulate symlinks or paths to write outside the container's intended boundaries. The vulnerability has been assigned a CVSS v4.0 score of 7.6 HIGH with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U (NVD).

Impact

When exploited, this vulnerability allows malicious container images to gain unauthorized access to the host filesystem, potentially overwriting critical host files. This is particularly dangerous in production container deployments where image pulls happen automatically and frequently (Security Online).

Mitigation and workarounds

The vulnerability has been patched in containerd version 2.1.1. Users are strongly advised to update to this version. As a temporary workaround, organizations should ensure that only trusted images are used and that only trusted users have permissions to import images (Containerd Advisory).

Community reactions

The containerd project has acknowledged the contribution of Tõnis Tiigi for responsibly disclosing this issue in accordance with the containerd security policy (Containerd Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management