Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
10.0

Rancher Cloud Credentials Can Be Used by Unauthorized Users

GHSA-gqf8-rvrh-g7w6 CVE-2021-25320
Summary

Users with a valid Rancher login can potentially access cloud credentials of other users and use them to interact with cloud providers. This is happening because the system doesn't properly check who is making API calls. To fix this, update to the latest patched version of Rancher.

What to do
  • Update github.com rancher to version 2.4.16.
  • Update github.com rancher to version 2.5.9.
Affected software
VendorProductAffected versionsFix available
github.com rancher > 2.2.0 , <= 2.4.16 2.4.16
github.com rancher > 2.5.0 , <= 2.5.9 2.5.9
rancher rancher <= 2.4.16
rancher rancher > 2.5.0 , <= 2.5.9
Original title
Rancher cloud credentials can be used through proxy API by users without access
Original description
A vulnerability was discovered in Rancher 2.2.0 through the aforementioned patched versions, where cloud credentials weren't being properly validated through the Rancher API. Specifically through a proxy designed to communicate with cloud providers. Any Rancher user that was logged-in and aware of a cloud-credential ID that was valid for a given cloud provider, could call that cloud provider's API through the proxy API, and the cloud-credential would be attached. The exploit is limited to valid Rancher users. There is not a direct mitigation outside of upgrading to the patched Rancher versions.
ghsa CVSS3.1 10.0
Vulnerability type
CWE-284 Improper Access Control
Published: 3 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026