CVE-2025-58061
Description
OpenEBS Local PV RawFile allows dynamic deployment of Stateful Persistent Node-Local Volumes & Filesystems for Kubernetes. Prior to version 0.10.0, persistent volume data is world readable and that would allow non-privileged users to access sensitive data such as databases of k8s workload. The rawfile-localpv storage class creates persistent volume data under /var/csi/rawfile/ on Kubernetes hosts by default. However, the directory and data in it are world-readable. It allows non-privileged users to access the whole persistent volume data, and those can include sensitive information such as a whole database if the Kubernetes tenants are running MySQL or PostgreSQL in a container so it could lead to a database breach. This issue has been patched in version 0.10.0.
Affected products
1- Range: 0.3.0, 0.4.0, 0.4.1, …
Patches
1cfa49b9189f5fix: set tag with app version (#127)
1 file changed · +1 −1
deploy/helm/rawfile-localpv/templates/_helpers.tpl+1 −1 modified@@ -66,7 +66,7 @@ Create the name of the service account to use Some helpers to handle image global information */}} {{- define "rawfile-localpv.controller-image-tag" -}} -{{- $imageTag := .Values.controller.image.tag | default .Values.image.tag | default .Chart.AppVersion }} +{{- $imageTag := .Values.controller.image.tag | default .Values.image.tag | default (printf "v%s" .Chart.AppVersion) }} {{- printf "%s" $imageTag }} {{- end }}
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
1News mentions
0No linked articles in our index yet.