Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. kubevirt.io/kubevirt
  4. ›
  5. CVE-2025-14525

CVE-2025-14525: KubeVirt Guest Agent DoS via Excessive Network Interface Reports

January 26, 2026 (updated January 27, 2026)

A flaw was found in KubeVirt. A user within a virtual machine (VM), if the guest agent is active, can exploit this by causing the agent to report an excessive number of network interfaces. This action can overwhelm the system’s ability to store VM configuration updates, effectively blocking changes to the Virtual Machine Instance (VMI). This allows the VM user to restrict the VM administrator’s ability to manage the VM, leading to a Denial of Dervice for administrative operations.

References

  • access.redhat.com/security/cve/CVE-2025-14525
  • bugzilla.redhat.com/show_bug.cgi?id=2421360
  • github.com/advisories/GHSA-25mh-hp8x-cgrv
  • github.com/kubevirt/kubevirt
  • github.com/kubevirt/kubevirt/releases/tag/v1.7.0
  • nvd.nist.gov/vuln/detail/CVE-2025-14525

Code Behaviors & Features

Detect and mitigate CVE-2025-14525 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.7.0

Solution

Unfortunately, there is no solution available yet.

Impact 6.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

go/kubevirt.io/kubevirt/CVE-2025-14525.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:40 +0000.