Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/siderolabs/omni
  4. ›
  5. CVE-2025-59824

CVE-2025-59824: Omni Wireguard SideroLink potential escape

September 24, 2025 (updated September 26, 2025)

This vulnerability creates two distinct attack scenarios based on Omni’s IP forwarding configuration.

  1. IP Forwarding Disabled (Default) If IP forwarding is disabled, an attacker on a Talos machine can send packets over SideroLink to any listening service on Omni itself (e.g., an internal API). If Omni is running in host networking mode, any service on the host machine could also be targeted. While this is the default configuration, Omni does not enforce it.

  2. IP Forwarding Enabled If IP forwarding is enabled, an attacker on a Talos machine can communicate with other machines connected to Omni or route packets deeper into Omni’s network. Although this is not the default configuration, Omni does not check for or prevent this state.

References

  • github.com/advisories/GHSA-hqrf-67pm-wgfq
  • github.com/siderolabs/omni
  • github.com/siderolabs/omni/commit/a5efd816a239e6c9e5ea7c0d43c02c04504d7b60
  • github.com/siderolabs/omni/security/advisories/GHSA-hqrf-67pm-wgfq
  • nvd.nist.gov/vuln/detail/CVE-2025-59824

Code Behaviors & Features

Detect and mitigate CVE-2025-59824 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.48.0

Fixed versions

  • 0.48.0

Solution

Upgrade to version 0.48.0 or above.

Weakness

  • CWE-863: Incorrect Authorization

Source file

go/github.com/siderolabs/omni/CVE-2025-59824.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 08 Oct 2025 12:17:54 +0000.