Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/rancher
  4. ›
  5. CVE-2025-54468

CVE-2025-54468: Rancher sends sensitive information to external services through the `/meta/proxy` endpoint

September 26, 2025 (updated October 23, 2025)

A vulnerability has been identified within Rancher Manager whereby Impersonate-Extra-* headers are being sent to an external entity, for example amazonaws.com, via the /meta/proxy Rancher endpoint. These headers may contain identifiable and/or sensitive information e.g. email addresses.

If the authentication provider is configured to have email or other sensitive and/or identifiable information as part of the username and principal ID then when a new cloud credential is being created in Rancher Manager this information is sent to an external entity such as amazonaws.com, in case of an AWS cloud credentials, in Impersonate-Extra-Username and/or Impersonate-Extra-Principalid headers. Please note that neither password, password hashes or Rancher’s related authentication tokens are leaked in those requests.

The entities to which such information is sent to are limited by the allowlisted domains specified in nodedrivers.management.cattle.io objects.

For example, the Amazon EC2 node driver contains the following allowlisted domains:

  • iam.amazonaws.com
  • iam.us-gov.amazonaws.com
  • iam.%.amazonaws.com.cn
  • iam.global.api.aws
  • ec2.%.amazonaws.com
  • ec2.%.amazonaws.com.cn
  • ec2.%.api.aws
  • eks.%.amazonaws.com
  • eks.%.amazonaws.com.cn
  • eks.%.api.aws
  • kms.%.amazonaws.com
  • kms.%.amazonaws.com.cn
  • kms.%.api.aws

While the DigitalOcean driver contains the following allowlisted domain:

  • api.digitalocean.com

References

  • bugzilla.suse.com/show_bug.cgi?id=CVE-2025-54468
  • github.com/advisories/GHSA-mjcp-rj3c-36fr
  • github.com/rancher/rancher
  • github.com/rancher/rancher/security/advisories/GHSA-mjcp-rj3c-36fr
  • nvd.nist.gov/vuln/detail/CVE-2025-54468
  • pkg.go.dev/vuln/GO-2025-3982

Code Behaviors & Features

Detect and mitigate CVE-2025-54468 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.9.0 before 2.9.12, all versions starting from 2.10.0 before 2.10.10, all versions starting from 2.11.0 before 2.11.6, all versions starting from 2.12.0 before 2.12.2

Fixed versions

  • 2.12.2
  • 2.11.6
  • 2.10.10
  • 2.9.12

Solution

Upgrade to versions 2.10.10, 2.11.6, 2.12.2, 2.9.12 or above.

Impact 4.7 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

go/github.com/rancher/rancher/CVE-2025-54468.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 23 Jan 2026 12:17:03 +0000.