Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12548: Missing Authentication for Critical Function in Red Hat Red Hat OpenShift Dev Spaces (RHOSDS) 3.22

0
Critical
VulnerabilityCVE-2025-12548cvecve-2025-12548
Published: Tue Jan 13 2026 (01/13/2026, 15:35:01 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Dev Spaces (RHOSDS) 3.22

Description

A flaw was found in Eclipse Che che-machine-exec. This vulnerability allows unauthenticated remote arbitrary command execution and secret exfiltration (SSH keys, tokens, etc.) from other users' Developer Workspace containers, via an unauthenticated JSON-RPC / websocket API exposed on TCP port 3333.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:44:11 UTC

Technical Analysis

CVE-2025-12548 is a critical security vulnerability discovered in Red Hat OpenShift Dev Spaces (RHOSDS) version 3.22, specifically affecting the Eclipse Che che-machine-exec component. The vulnerability stems from a missing authentication mechanism on a JSON-RPC / websocket API endpoint exposed on TCP port 3333. This API allows remote attackers to interact with Developer Workspace containers without any authentication, enabling them to execute arbitrary commands remotely. Furthermore, attackers can exfiltrate sensitive secrets such as SSH keys, tokens, and other credentials stored within other users' containers. The vulnerability affects multi-tenant environments where multiple developers share the same OpenShift Dev Spaces infrastructure, potentially allowing one compromised container to impact others. The CVSS v3.1 base score is 9.0 (critical), reflecting the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation due to no authentication and network accessibility. The vulnerability was publicly disclosed on January 13, 2026, with no known exploits in the wild at the time of publication. The flaw requires network access to the exposed port but does not require user interaction or prior authentication, making it highly exploitable in exposed deployments. The vulnerability highlights the risks of exposing internal APIs without proper access controls in containerized developer environments.

Potential Impact

The impact of CVE-2025-12548 is severe for organizations using Red Hat OpenShift Dev Spaces 3.22. Successful exploitation allows attackers to execute arbitrary commands remotely within developer workspace containers, potentially leading to full container compromise. Attackers can also steal sensitive secrets such as SSH keys and tokens, which may provide further access to internal systems, source code repositories, and production environments. This can result in data breaches, intellectual property theft, and lateral movement within the network. The compromise of developer environments undermines the software development lifecycle's integrity and confidentiality, increasing the risk of supply chain attacks. Availability may also be affected if attackers disrupt or destroy containerized workspaces. Given the critical nature of this vulnerability and the common use of OpenShift in enterprise environments, the threat poses a significant risk to organizations worldwide, especially those relying on containerized development platforms and multi-tenant cloud environments.

Mitigation Recommendations

To mitigate CVE-2025-12548, organizations should immediately apply any available patches or updates released by Red Hat for OpenShift Dev Spaces 3.22. If patches are not yet available, restrict network access to TCP port 3333 to trusted internal hosts only, using firewall rules or network segmentation to prevent unauthorized external access. Implement strict access controls and authentication mechanisms on the JSON-RPC / websocket API if possible, or disable the exposed API endpoint if it is not required. Monitor network traffic for unusual activity targeting port 3333 and audit developer workspace containers for signs of compromise. Employ container security best practices such as least privilege, secrets management, and runtime monitoring to detect and prevent lateral movement. Regularly review and rotate SSH keys and tokens stored within developer environments. Finally, educate developers and administrators about the risks of exposed internal APIs and enforce secure configuration baselines for containerized development platforms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-10-31T14:14:59.157Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696667b3a60475309f7ab4d2

Added to database: 1/13/2026, 3:41:39 PM

Last enriched: 2/27/2026, 8:44:11 PM

Last updated: 3/26/2026, 10:21:54 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses