CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-54867
7.00.03%

The Rust Runtime That Blinked: Breaking Out of Youki via Symlinks

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·6 min read·5 visits

PoC Available

Executive Summary (TL;DR)

The 'youki' container runtime failed to validate destination paths when mounting /proc and /sys. A malicious image containing symlinks at these locations can trick the runtime into writing mounts to the host filesystem, leading to container escape.

While Rust guarantees memory safety, it cannot protect developers from logic errors. A critical vulnerability in the 'youki' container runtime allows malicious container images to trick the runtime into mounting sensitive pseudo-filesystems onto the host machine via symbolic links, effectively bypassing container isolation.

Official Patches

youkiOfficial Release v0.5.5

Fix Analysis (1)

Technical Appendix

CVSS Score
7.0/ 10
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.03%
Top 100% most exploited

Affected Systems

youki container runtime < 0.5.5

Affected Versions Detail

Product
Affected Versions
Fixed Version
youki
youki-dev
< 0.5.50.5.5
AttributeDetail
CWECWE-61 (Symlink Following)
CVSS7.0 (High)
Attack VectorLocal (via Malicious Image)
PrivilegesLow (Container User)
ImpactContainer Escape / Host FS Access
Patchyouki v0.5.5

MITRE ATT&CK Mapping

T1611Escape to Host
Privilege Escalation
T1222File and Directory Permissions Modification
Defense Evasion
CWE-61
Unix Symbolic Link (Symlink) Following

The software does not properly verify that a path is a symbolic link before writing to it, allowing for file manipulation outside the intended directory.

Known Exploits & Detection

Research AnalysisStandard container image symlink exploitation technique (similar to runc CVE-2023-27561)

Vulnerability Timeline

Patch Committed (v0.5.5)
2025-01-15
CVE Published
2025-01-20

References & Sources

  • [1]Youki Repository
  • [2]NVD Entry
Related Vulnerabilities
CVE-2023-27561CVE-2023-28642

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.