CVE-2025-15558 — Uncontrolled Search Path Element in Docker CLI
Severity
7.0HIGHNVD
EPSS
0.0%
top 93.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 4
Latest updateMar 10
Description
Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker CLI is executed as a privileged user.
This issue affects Docker CLI: through 29.1.5 a…
CVSS vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Packages4 packages
Patches
🔴Vulnerability Details
3OSV▶
Docker CLI Plugins: Uncontrolled Search Path Element Leads to Local Privilege Escalation on Windows in github.com/docker/cli↗2026-03-10
OSV▶
Docker CLI Plugins: Uncontrolled Search Path Element Leads to Local Privilege Escalation on Windows↗2026-03-05
GHSA▶
Docker CLI Plugins: Uncontrolled Search Path Element Leads to Local Privilege Escalation on Windows↗2026-03-05
📋Vendor Advisories
1Red Hat
▶