PT-2025-44043 · Docker+2 · Docker Compose+2

Published

2025-10-27

·

Updated

2026-03-27

·

CVE-2025-62725

CVSS v2.0

10

High

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Docker Compose versions prior to 2.40.2
Description Docker Compose is affected by a path traversal flaw stemming from improper restriction of path names to accessible directories. This issue allows a remote attacker to overwrite arbitrary files on the system running Docker Compose. The flaw occurs when processing OCI compose artifacts containing annotations like com.docker.compose.extends or com.docker.compose.envfile. Specifically, the attacker-supplied values from com.docker.compose.file or com.docker.compose.envfile are joined with the local cache directory, enabling the attacker to write files outside the intended cache location. This can be triggered even when using read-only commands such as docker compose config or docker compose ps. Exploitation can lead to system compromise, potentially through overwriting binaries like Docker itself or modifying SSH authorized keys for immediate server access.
Recommendations Upgrade to Docker Compose version 2.40.2 or later to address this issue.

Exploit

Fix

RCE

DoS

Path traversal

Weakness Enumeration

Related Identifiers

BDU:2025-14002
CVE-2025-62725
GHSA-GV8H-7V7W-R22Q
GO-2025-4077
OPENSUSE-SU-2025:15710-1
OPENSUSE-SU-2026:20438-1
SUSE-SU-2026:20656-1
SUSE-SU-2026:20871-1
SUSE-SU-2026:20949-1
SUSE-SU-2026:20976-1

Affected Products

Debian
Docker Compose
Red Os