Cyber Posture

CVE-2025-29266

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0210 84.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-29266 is a critical-severity Authentication Bypass by Alternate Name (CWE-289) vulnerability in Unraid WebGUI (inferred from references). Its CVSS base score is 9.6 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-17 (Remote Access) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the authentication bypass flaw by requiring identification, reporting, and correction via patching to Unraid 7.0.1 or later.

prevent

Mandates control and authentication of remote access methods, blocking unauthenticated exploitation of WebGUI and web console from adjacent networks.

prevent

Enforces secure baseline configuration settings to prohibit risky container setups like host networking mode with Tailscale that expose vulnerable interfaces.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authentication bypass in WebGUI/web console when exposed via Host networking + Tailscale directly enables exploitation of a remotely accessible application for initial root access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Unraid 7.0.0 before 7.0.1 allows remote users to access the Unraid WebGUI and web console as root without authentication if a container is running in Host networking mode with Use Tailscale enabled.

Deeper analysisAI

CVE-2025-29266 is an authentication bypass vulnerability affecting Unraid OS version 7.0.0 before 7.0.1, specifically in the WebGUI and web console components. It arises when a container is configured to run in Host networking mode with the Use Tailscale option enabled, allowing remote users to access these interfaces as root without any authentication. The vulnerability is classified under CWE-289 (Authentication Bypass by Assumed-Immutable Data) and carries a CVSS v3.1 base score of 9.6 (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.

Attackers on an adjacent network (AV:A) can exploit this issue with low complexity and no required privileges or user interaction. Exploitation requires the presence of a container running in Host networking mode with Tailscale enabled, after which remote users can directly access the Unraid WebGUI and web console as root. Successful exploitation grants high-impact confidentiality, integrity, and availability violations, including full administrative control over the host system.

Unraid addresses this vulnerability in version 7.0.1, as detailed in the official release notes. Security practitioners should upgrade to Unraid 7.0.1 or later and review container configurations to disable Tailscale or avoid Host networking mode where possible. Additional details are available in the Unraid WebGUI GitHub repository and advisories from edac.dev.

Details

CWE(s)

Affected Products

Unraid
WebGUI
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-56511Shared CWE-289
CVE-2025-13613Shared CWE-289
CVE-2024-11283Shared CWE-289
CVE-2026-32036Shared CWE-289
CVE-2025-55130Shared CWE-289
CVE-2026-24058Shared CWE-289

References