CVE-2025-53710
Access Control Bypass via Command Injection in Foundry Container Service
Publication date: 2025-12-18
Last updated on: 2025-12-18
Assigner: Palantir Technologies
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| palantir | foundry_container_service | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-653 | The product does not properly compartmentalize or isolate functionality, processes, or resources that require different privilege levels, rights, or permissions. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability arises from a product misconfiguration in certain deployment types of Foundry Container Service, allowing pods within the same namespace to communicate with each other. This communication bypasses access controls because a vulnerable endpoint executes user-controlled commands locally, potentially enabling unauthorized actions.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access and execution of commands within the container environment, potentially compromising confidentiality, integrity, and availability of data and services. Attackers could exploit this to perform malicious actions, escalate privileges, or disrupt operations.