Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2021-25320

CVE-2021-25320: Rancher cloud credentials can be used through proxy API by users without access

March 3, 2026

A vulnerability was discovered in Rancher 2.2.0 through the aforementioned patched versions, where cloud credentials weren’t being properly validated through the Rancher API. Specifically through a proxy designed to communicate with cloud providers. Any Rancher user that was logged-in and aware of a cloud-credential ID that was valid for a given cloud provider, could call that cloud provider’s API through the proxy API, and the cloud-credential would be attached. The exploit is limited to valid Rancher users. There is not a direct mitigation outside of upgrading to the patched Rancher versions.

References

  • bugzilla.suse.com/show_bug.cgi?id=1185514
  • github.com/advisories/GHSA-gqf8-rvrh-g7w6
  • github.com/rancher/rancher
  • github.com/rancher/rancher/security/advisories/GHSA-gqf8-rvrh-g7w6
  • nvd.nist.gov/vuln/detail/CVE-2021-25320

Code Behaviors & Features

Detect and mitigate CVE-2021-25320 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.2.0 before 2.4.16, all versions starting from 2.5.0 before 2.5.9

Fixed versions

  • 2.4.16
  • 2.5.9

Solution

Upgrade to versions 2.4.16, 2.5.9 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-284: Improper Access Control

Source file

go/github.com/rancher/rancher/CVE-2021-25320.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 10 Apr 2026 12:17:54 +0000.