Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11060: Incorrect Authorization

0
Medium
VulnerabilityCVE-2025-11060cvecve-2025-11060
Published: Fri Sep 26 2025 (09/26/2025, 12:01:22 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: OpenShift Service Mesh 3

Description

A flaw was found in the live query subscription mechanism of the database engine. This vulnerability allows record or guest users to observe unauthorized records within the same table, bypassing access controls, via crafted LIVE SELECT subscriptions when other users alter or delete records.

AI-Powered Analysis

AILast updated: 11/07/2025, 20:26:55 UTC

Technical Analysis

CVE-2025-11060 is a vulnerability identified in the live query subscription mechanism of the database engine within Red Hat's OpenShift Service Mesh 3, specifically affecting versions 0, 2.2.0, 2.3.0, and 3.3.0. The flaw allows users with record-level or guest privileges to bypass intended access controls and observe unauthorized records within the same database table. This occurs through crafted LIVE SELECT subscriptions that exploit the way the system handles live query updates when other users modify or delete records. The vulnerability does not require high privileges—only low-level privileges—and some user interaction is necessary to trigger the unauthorized data exposure. The vulnerability impacts confidentiality by allowing unauthorized data viewing but does not affect data integrity or availability. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N) indicates network attack vector, low attack complexity, requires privileges, user interaction, unchanged scope, and high confidentiality impact. No known exploits have been reported in the wild as of the publication date (September 26, 2025). The vulnerability is classified as medium severity due to the balance of ease of exploitation and the impact on confidentiality without affecting integrity or availability.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data disclosure within environments using the affected versions of OpenShift Service Mesh 3. Organizations relying on live query subscriptions for real-time data updates may inadvertently expose sensitive information to users who should not have access, potentially leading to data leakage of confidential or regulated data. This could impact compliance with GDPR and other data protection regulations, resulting in legal and reputational consequences. The vulnerability does not allow data modification or denial of service, limiting its impact to confidentiality breaches. However, the ease of exploitation with low privileges and user interaction means insider threats or compromised low-privilege accounts could leverage this flaw to escalate data access. This is particularly critical for sectors handling sensitive data such as finance, healthcare, and government services across Europe.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they are released to address CVE-2025-11060. 2. Until patches are available, restrict the use of live query subscriptions to trusted users only, minimizing the number of users with record or guest privileges capable of initiating such queries. 3. Implement strict access control policies and regularly audit user permissions related to database query subscriptions. 4. Monitor live query subscription activity for unusual patterns or attempts to access unauthorized records, using logging and anomaly detection tools. 5. Educate users about the risks of interacting with crafted live queries and enforce multi-factor authentication to reduce the risk of compromised accounts. 6. Consider network segmentation and isolation of critical OpenShift Service Mesh deployments to limit exposure. 7. Engage with Red Hat support for guidance on interim mitigations and best practices specific to your deployment environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-09-26T11:46:23.698Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d68454446db3b7cfbd106b

Added to database: 9/26/2025, 12:17:24 PM

Last enriched: 11/7/2025, 8:26:55 PM

Last updated: 11/15/2025, 7:12:36 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats