PT-2025-44043 · Docker+2 · Docker Compose+2
Published
2025-10-27
·
Updated
2026-03-27
·
CVE-2025-62725
CVSS v2.0
10
High
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Docker Compose versions prior to 2.40.2
Description
Docker Compose is affected by a path traversal flaw stemming from improper restriction of path names to accessible directories. This issue allows a remote attacker to overwrite arbitrary files on the system running Docker Compose. The flaw occurs when processing OCI compose artifacts containing annotations like
com.docker.compose.extends or com.docker.compose.envfile. Specifically, the attacker-supplied values from com.docker.compose.file or com.docker.compose.envfile are joined with the local cache directory, enabling the attacker to write files outside the intended cache location. This can be triggered even when using read-only commands such as docker compose config or docker compose ps. Exploitation can lead to system compromise, potentially through overwriting binaries like Docker itself or modifying SSH authorized keys for immediate server access.Recommendations
Upgrade to Docker Compose version 2.40.2 or later to address this issue.
Exploit
Fix
RCE
DoS
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Debian
Docker Compose
Red Os