CVE-2025-29266
Published: 31 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-29266 is an authentication bypass vulnerability affecting Unraid OS version 7.0.0 before 7.0.1, specifically in the WebGUI and web console components. It arises when a container is configured to run in Host networking mode with the Use Tailscale option enabled, allowing remote users to access these interfaces as root without any authentication. The vulnerability is classified under CWE-289 (Authentication Bypass by Assumed-Immutable Data) and carries a CVSS v3.1 base score of 9.6 (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.
Attackers on an adjacent network (AV:A) can exploit this issue with low complexity and no required privileges or user interaction. Exploitation requires the presence of a container running in Host networking mode with Tailscale enabled, after which remote users can directly access the Unraid WebGUI and web console as root. Successful exploitation grants high-impact confidentiality, integrity, and availability violations, including full administrative control over the host system.
Unraid addresses this vulnerability in version 7.0.1, as detailed in the official release notes. Security practitioners should upgrade to Unraid 7.0.1 or later and review container configurations to disable Tailscale or avoid Host networking mode where possible. Additional details are available in the Unraid WebGUI GitHub repository and advisories from edac.dev.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Authentication bypass in WebGUI/web console when exposed via Host networking + Tailscale directly enables exploitation of a remotely accessible application for initial root access.