Security Advisories and CVEs
Rancher is committed to informing the community of security issues in our products. Rancher will publish security advisories and CVEs (Common Vulnerabilities and Exposures) for issues we have resolved. New security advisories are also published in Rancher’s GitHub security page.
| ID | Description | Date | Resolution |
|---|---|---|---|
Rancher now protects against arbitrary file access via path traversal in Rancher Extensions. Note by default only users with administrative permissions can deploy UI extensions unless explicit permission is granted to other users. |
30 Apr 2026 |
||
Rancher now provides new versions of the Rancher Backup chart which prevent the leak of secret S3 credentials via the Rancher Backup pod log. |
29 Jan 2026 |
||
Rancher now removes the ability to fetch CA certificates stored in Rancher’s setting |
29 Jan 2026 |
||
Rancher now removes the corresponding ClusterRoleBindings whenever the admin GlobalRole or its GlobalRoleBindings are deleted. Previously orphaned ClusterRoleBindings were marked with the annotation |
23 Oct 2025 |
||
The Rancher audit log redaction process has changed to the following:
|
23 Oct 2025 |
Rancher v2.12.3 |
|
Setting the username of one user as the same username of another user causes an error when either user attempts to log in. Therefore, a user with the |
25 Sep 2025 |
||
The Rancher CLI is modified to print the |
25 Sep 2025 |
||
|
25 Sep 2025 |
||
POSTs to the Rancher API endpoints are now limited to 1 Mi; this is configurable through the settings if you need a larger limit. The Rancher authentication endpoints are configured independently of the main public API (as you might need bigger payloads in the other API endpoints). Suppose you need to increase the maximum allowed payload for authentication. In that case, you can set the environment variable |
28 Aug 2025 |
||
Following a recent change excluding Helm values files from bundles, an edge case subsisted where the values files referenced in |
28 Aug 2025 |