Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12548: Missing Authentication for Critical Function in Red Hat Red Hat OpenShift Dev Spaces (RHOSDS) 3.22

0
Critical
VulnerabilityCVE-2025-12548cvecve-2025-12548
Published: Tue Jan 13 2026 (01/13/2026, 15:35:01 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Dev Spaces (RHOSDS) 3.22

Description

A flaw was found in Eclipse Che che-machine-exec. This vulnerability allows unauthenticated remote arbitrary command execution and secret exfiltration (SSH keys, tokens, etc.) from other users' Developer Workspace containers, via an unauthenticated JSON-RPC / websocket API exposed on TCP port 3333.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:12:42 UTC

Technical Analysis

CVE-2025-12548 identifies a critical security flaw in Red Hat OpenShift Dev Spaces (RHOSDS) version 3.22, specifically within the Eclipse Che che-machine-exec component. This vulnerability stems from a missing authentication mechanism on a JSON-RPC / websocket API exposed on TCP port 3333. Because this API is unauthenticated, remote attackers can connect without credentials and perform arbitrary command execution within other users' Developer Workspace containers. This access also enables exfiltration of sensitive secrets such as SSH keys and tokens stored in these containers. The vulnerability compromises confidentiality by leaking secrets, integrity by allowing arbitrary commands, and availability by potentially disrupting container operations. The CVSS 3.1 score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H) indicates network exploitable with low attack complexity, requiring some privileges but user interaction is needed, and the scope is changed, affecting multiple containers. Although no public exploits are reported yet, the exposed API on a well-known port makes it a high-risk target for attackers. The flaw affects containerized developer environments, which are critical in modern DevOps workflows, potentially allowing attackers to pivot into broader infrastructure. The vulnerability was reserved on 2025-10-31 and published on 2026-01-13, indicating recent discovery and disclosure. No patches or mitigations are linked yet, emphasizing the need for immediate defensive measures.

Potential Impact

For European organizations, this vulnerability poses a significant risk to development environments and potentially to production infrastructure if compromised developer workspaces are leveraged for lateral movement. Confidentiality is severely impacted due to the theft of SSH keys and tokens, which can grant attackers access to source code repositories, cloud environments, and other critical systems. Integrity is at risk as attackers can execute arbitrary commands, potentially injecting malicious code or altering configurations. Availability may be disrupted if attackers interfere with container operations or launch denial-of-service activities. Organizations relying heavily on Red Hat OpenShift for container orchestration and developer productivity tools are particularly vulnerable. The exposure of developer secrets can lead to intellectual property theft, compliance violations (e.g., GDPR), and reputational damage. The critical nature of this vulnerability necessitates urgent attention to prevent exploitation, especially in sectors with sensitive data such as finance, healthcare, and government within Europe.

Mitigation Recommendations

1. Immediately restrict network access to TCP port 3333 to trusted internal IP addresses only, using firewall rules or network policies. 2. Implement authentication and authorization controls on the JSON-RPC / websocket API if possible, or disable the API if not required. 3. Monitor network traffic and logs for unusual connections or commands targeting port 3333. 4. Isolate developer workspace containers to minimize lateral movement potential, employing strict container runtime security policies. 5. Rotate all SSH keys, tokens, and credentials stored in affected environments to invalidate any potentially compromised secrets. 6. Apply any forthcoming patches from Red Hat promptly once available. 7. Conduct security awareness training for developers to recognize suspicious activity and enforce least privilege principles. 8. Use runtime security tools to detect anomalous container behavior indicative of exploitation attempts. 9. Review and harden CI/CD pipelines to prevent injection of malicious code via compromised developer environments. 10. Engage with Red Hat support for guidance and updates on remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-10-31T14:14:59.157Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696667b3a60475309f7ab4d2

Added to database: 1/13/2026, 3:41:39 PM

Last enriched: 1/22/2026, 8:12:42 PM

Last updated: 2/4/2026, 9:49:57 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats