| CVE ID | CVE-2025-15558 |
| CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
Docker |
| AFFECTED PRODUCTS |
Docker |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the plugins directory path. The product executes a program from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the target user. |
| ADDITIONAL DETAILS |
Docker has issued an update to correct this vulnerability. More details can be found at:
https://github.com/docker/cli/security/advisories/GHSA-p436-gjf2-799p |
| DISCLOSURE TIMELINE |
|
| CREDIT | Nitesh Surana (niteshsurana.com) of Trend Research |