Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10725: Incorrect Privilege Assignment in opendatahub-io opendatahub-operator

0
Critical
VulnerabilityCVE-2025-10725cvecve-2025-10725
Published: Tue Sep 30 2025 (09/30/2025, 17:47:08 UTC)
Source: CVE Database V5
Vendor/Project: opendatahub-io
Product: opendatahub-operator

Description

A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it.

AI-Powered Analysis

AILast updated: 12/24/2025, 13:49:33 UTC

Technical Analysis

CVE-2025-10725 is an incorrect privilege assignment vulnerability found in the opendatahub-operator component of the Red Hat Openshift AI Service. The flaw allows an attacker with a low-privileged authenticated account—such as a data scientist operating within a standard Jupyter notebook environment—to escalate their privileges to that of a full cluster administrator. This escalation is possible due to improper access control or misconfiguration within the operator, which fails to enforce strict privilege boundaries between user roles. Once escalated, the attacker gains unrestricted control over the entire Kubernetes cluster, including the ability to access sensitive data, modify or delete resources, disrupt services, and control the underlying infrastructure hosting the AI workloads and other applications. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication, making it highly accessible to insiders or compromised accounts. The CVSS v3.1 score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) indicates a critical severity with network attack vector, low attack complexity, and partial privileges required initially. The scope is changed, meaning the vulnerability affects resources beyond the initially compromised component. No public exploits are known yet, but the impact potential is total cluster compromise. The affected version is listed as '0', which likely indicates all versions prior to a fix or initial release. This vulnerability highlights the risks of privilege mismanagement in complex cloud-native AI platforms and the importance of strict role-based access control (RBAC) enforcement.

Potential Impact

For European organizations, the impact of CVE-2025-10725 is severe. Organizations using Red Hat Openshift AI Service with the opendatahub-operator component risk full cluster compromise if an attacker gains access to any authenticated low-privileged account. This can lead to theft of sensitive intellectual property, personal data, and proprietary AI models, violating GDPR and other data protection regulations. Service disruption or destruction of workloads can cause significant operational downtime and financial losses. The attacker’s ability to control underlying infrastructure also poses risks of lateral movement to other connected systems, increasing the attack surface. Given the widespread adoption of Red Hat OpenShift in Europe’s public and private sectors, including government, finance, and research institutions, the vulnerability could have broad and critical consequences. The total loss of confidentiality, integrity, and availability could undermine trust in AI services and cloud platforms, with potential regulatory and reputational repercussions.

Mitigation Recommendations

1. Immediately apply any patches or updates released by Red Hat addressing CVE-2025-10725 once available. 2. Until patches are applied, restrict access to the opendatahub-operator and related AI service components to only trusted, essential personnel. 3. Enforce strict RBAC policies limiting the permissions of data scientists and other users to the minimum necessary, and regularly audit these permissions. 4. Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of account compromise. 5. Monitor cluster activity for unusual privilege escalations or administrative actions originating from low-privileged accounts. 6. Use network segmentation to isolate AI workloads and limit lateral movement in case of compromise. 7. Conduct regular security assessments and penetration tests focusing on privilege escalation vectors within Kubernetes and OpenShift environments. 8. Educate users about the risks of credential sharing and phishing, which could lead to initial account compromise. 9. Employ runtime security tools that can detect anomalous behavior indicative of privilege escalation attempts. 10. Maintain incident response plans tailored to Kubernetes/OpenShift environments to quickly contain and remediate breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-09-19T13:40:32.975Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dc18cc7e0729622ee4ccef

Added to database: 9/30/2025, 5:52:12 PM

Last enriched: 12/24/2025, 1:49:33 PM

Last updated: 1/7/2026, 8:32:22 AM

Views: 364

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats