Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2025-23387

CVE-2025-23387: Rancher's SAML-based login via CLI can be denied by unauthenticated users

February 27, 2025 (updated April 11, 2025)

A vulnerability has been identified within Rancher where it is possible for an unauthenticated user to list all CLI authentication tokens and delete them before the CLI is able to get the token value. This effectively prevents users from logging in via the CLI when using rancher token as the execution command (instead of the token directly being in the kubeconfig).

Note that this token is not the kubeconfig token and if an attacker is able to intercept it they can’t use it to impersonate a real user since it is encrypted.

This happens because for SAML-based authentication providers, the login flow from the CLI works by generating a link to be pasted in the browser, and then polling every 10 seconds for the /v3-public/authTokens/<token name> endpoint. The <token name> is randomly generated by the CLI. Once the login flow succeeds, Rancher creates an auth token (with an encrypted token value). The CLI then deletes the authToken.

Rancher deployments using only the local authentication provider, or non-SAML-based authentication providers, are not impacted by this vulnerability. SAML-based users not using the CLI are also not impacted.

Please consult the associated MITRE ATT&CK - Technique - Account Access Removal for further information about this category of attack.

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23387
  • github.com/advisories/GHSA-5qmp-9x47-92q8
  • github.com/rancher/rancher
  • github.com/rancher/rancher/security/advisories/GHSA-5qmp-9x47-92q8
  • nvd.nist.gov/vuln/detail/CVE-2025-23387

Code Behaviors & Features

Detect and mitigate CVE-2025-23387 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.8.0 before 2.8.13, all versions starting from 2.9.0 before 2.9.7, all versions starting from 2.10.0 before 2.10.3

Fixed versions

  • 2.8.13
  • 2.9.7
  • 2.10.3

Solution

Upgrade to versions 2.10.3, 2.8.13, 2.9.7 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

go/github.com/rancher/rancher/CVE-2025-23387.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:15 +0000.