CVE-2025-7195
Operator-sdk: privilege escalation due to incorrect permissions of /etc/passwd
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Early versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images. In affected images, the /etc/passwd file is created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2025-07-07 CVE Reserved
- 2025-08-07 CVE Published
- 2025-08-13 EPSS Updated
- 2025-08-19 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-276: Incorrect Default Permissions
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://access.redhat.com/security/cve/CVE-2025-7195 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=2376300 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Acm Search vendor "Redhat" for product "Acm" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Advanced Cluster Management For Kubernetes Search vendor "Redhat" for product "Advanced Cluster Management For Kubernetes" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Advanced Cluster Security Search vendor "Redhat" for product "Advanced Cluster Security" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Multicluster Engine Search vendor "Redhat" for product "Multicluster Engine" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Multicluster Globalhub Search vendor "Redhat" for product "Multicluster Globalhub" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Search vendor "Redhat" for product "Openshift" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Data Foundation Search vendor "Redhat" for product "Openshift Data Foundation" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift File Integrity Operator Search vendor "Redhat" for product "Openshift File Integrity Operator" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Search vendor "Redhat" for product "Openshift" | * | - |
Affected
|