CVE-2025-14443
Unknown Unknown - Not Provided
SSRF in ose-openshift-apiserver Enables Internal Network Enumeration

Publication date: 2025-12-16

Last updated on: 2026-02-27

Assigner: Red Hat, Inc.

Description
A flaw was found in ose-openshift-apiserver. This vulnerability allows internal network enumeration, service discovery, limited information disclosure, and potential denial-of-service (DoS) through Server-Side Request Forgery (SSRF) due to missing IP address and network-range validation when processing user-supplied image references.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2026-02-27
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
redhat openshift_apiserver 3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows internal network enumeration, service discovery, and limited information disclosure through SSRF, which could lead to unauthorized access to sensitive internal services and data. Such unauthorized information disclosure and potential denial-of-service conditions may impact compliance with standards like GDPR and HIPAA, which require protection of sensitive data and system availability. Specifically, the leakage of internal API structures and metadata endpoints could expose personal or sensitive information, violating data protection requirements. Therefore, organizations using the affected OpenShift API Server should consider this vulnerability a risk to compliance and implement recommended mitigations to prevent unauthorized internal access and information leakage. [1, 2]


Can you explain this vulnerability to me?

CVE-2025-14443 is a Server-Side Request Forgery (SSRF) vulnerability in the OpenShift API Server's ImageStreamImport functionality. It occurs because the API server does not validate IP addresses or network ranges when processing user-supplied image references. This allows an attacker with image import permissions to make the server send network requests to internal services such as localhost, cloud metadata endpoints, Kubernetes API server, and private network ranges. As a result, the attacker can perform internal network enumeration, service discovery, and limited information disclosure by receiving HTTP responses from these internal services. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker with image import permissions to probe and enumerate your internal network and services. They can discover internal APIs, cloud metadata services, and localhost-only services, potentially gaining sensitive information about your infrastructure. Additionally, the attacker could cause denial-of-service (DoS) conditions by making excessive connection attempts. This compromises the confidentiality and availability of your internal systems. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by simulating SSRF attack vectors against the OpenShift ImageStreamImport functionality to observe if internal IP addresses and services are reachable via the API server. A Go-based testing harness (main.go) is available that simulates 21 SSRF attack vectors targeting image import, including requests to localhost, cloud metadata IPs, Kubernetes API server IPs, and private network ranges. Monitoring audit logs for suspicious ImageStreamImport requests and network connections to internal IP ranges (127.0.0.1, 169.254.169.254, 10.x.x.x, 192.168.x.x) can help detect exploitation attempts. Specific commands are not detailed, but using the provided Go testing tool from Resource 1 is recommended for detection. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include enforcing strict IP address validation in the ImageStreamImport admission controller to block all loopback (127.0.0.0/8), link-local (169.254.0.0/16), and RFC1918 private network addresses. Sanitize error messages to prevent information leakage. Additionally, implement DNS resolution validation to prevent DNS rebinding, HTTP redirect chain validation, and block cluster service network CIDRs. Enhancing audit logging and monitoring for suspicious import attempts is also recommended. These steps prioritize blocking unauthorized internal network access and reducing information disclosure. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart