CVE-2025-15558Uncontrolled Search Path Element in Docker CLI

Severity
7.0HIGHNVD
EPSS
0.0%
top 93.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4
Latest updateMar 10

Description

Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker CLI is executed as a privileged user. This issue affects Docker CLI: through 29.1.5 a

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

Patches

🔴Vulnerability Details

3
OSV
Docker CLI Plugins: Uncontrolled Search Path Element Leads to Local Privilege Escalation on Windows in github.com/docker/cli2026-03-10
OSV
Docker CLI Plugins: Uncontrolled Search Path Element Leads to Local Privilege Escalation on Windows2026-03-05
GHSA
Docker CLI Plugins: Uncontrolled Search Path Element Leads to Local Privilege Escalation on Windows2026-03-05

📋Vendor Advisories

1
Red Hat
docker/cli: Docker CLI for Windows: Privilege escalation via malicious plugin binaries2026-03-04

🕵️Threat Intelligence

3
Wiz
CVE-2025-66580 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-15558 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2026-23523 Impact, Exploitability, and Mitigation Steps | Wiz