Cyber Posture

CVE-2026-25121

High

Published: 04 February 2026

Published
04 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0008 23.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25121 is a high-severity Relative Path Traversal (CWE-23) vulnerability in Chainguard Apko. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Compromise Software Dependencies and Development Tools (T1195.001); ranked at the 23.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Compromise Software Dependencies and Development Tools (T1195.001).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

MITRE ATT&CK Enterprise TechniquesAI

T1195.001 Compromise Software Dependencies and Development Tools Initial Access
Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise.
Why these techniques?

Path traversal in apko's dirFS (via malicious APK package from compromised/typosquatted repo) directly enables arbitrary directory/symlink creation outside the build root on the host, mapping to compromise of software dependencies and development tools in the supply chain.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

apko allows users to build and publish OCI container images built from apk packages. From version 0.14.8 to before 1.1.1, a path traversal vulnerability was discovered in apko's dirFS filesystem abstraction. An attacker who can supply a malicious APK package…

more

(e.g., via a compromised or typosquatted repository) could create directories or symlinks outside the intended installation root. The MkdirAll, Mkdir, and Symlink methods in pkg/apk/fs/rwosfs.go use filepath.Join() without validating that the resulting path stays within the base directory. This issue has been patched in version 1.1.1.

Deeper analysisAI

CVE-2026-25121 is a path traversal vulnerability in apko, a tool for building and publishing OCI container images from apk packages. The issue affects versions from 0.14.8 up to but not including 1.1.1 and resides in the dirFS filesystem abstraction, specifically the MkdirAll, Mkdir, and Symlink methods in pkg/apk/fs/rwosfs.go. These methods use filepath.Join() to construct paths without validating that the resulting path remains within the intended base installation directory, allowing traversal outside the root. The vulnerability is rated 7.5 on the CVSS v3.1 scale (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and maps to CWEs-23 (Path Traversal) and CWE-22 (Improper Limitation of a Pathname to a Restricted Directory).

An attacker can exploit this vulnerability by supplying a malicious APK package, such as through a compromised or typosquatted repository. Users of vulnerable apko versions who build container images from such packages enable the attacker to create directories or symlinks outside the intended installation root on the host filesystem. This requires no privileges and can be performed remotely with low complexity, resulting in high integrity impact but no confidentiality or availability disruption.

The vulnerability has been patched in apko version 1.1.1. Security practitioners should upgrade to this version or later. Additional details are available in the Chainguard GitHub security advisory (GHSA-5g94-c2wx-8pxw) and the patching commit (d8b7887a968a527791b3c591ae83928cb49a9f14).

Details

CWE(s)

Affected Products

chainguard
apko
0.14.8 — 1.1.1

CVEs Like This One

CVE-2026-25140Same product: Chainguard Apko
CVE-2026-25143Same vendor: Chainguard
CVE-2026-24843Same vendor: Chainguard
CVE-2026-28406Same vendor: Chainguard
CVE-2026-24844Same vendor: Chainguard
CVE-2026-27606Shared CWE-22
CVE-2026-21659Shared CWE-22, CWE-23
CVE-2025-29789Shared CWE-22, CWE-23
CVE-2025-27410Shared CWE-22, CWE-23
CVE-2026-27625Shared CWE-22, CWE-23

References