Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12744: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

0
High
VulnerabilityCVE-2025-12744cvecve-2025-12744
Published: Wed Dec 03 2025 (12/03/2025, 08:33:06 UTC)
Source: CVE Database V5

Description

A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:04:31 UTC

Technical Analysis

CVE-2025-12744 is an OS command injection vulnerability discovered in the ABRT (Automatic Bug Reporting Tool) daemon, which is used primarily in Fedora and related Linux distributions for automated crash reporting. The flaw arises because ABRT copies up to 12 characters from user-supplied mount information directly into a shell command string executed as root (specifically, the command 'docker inspect %s') without proper sanitization or neutralization of special shell metacharacters. This improper neutralization allows an unprivileged local user to craft malicious input containing shell metacharacters that break out of the intended command context and execute arbitrary commands with root privileges. The vulnerability requires only local access and no user interaction, making it a straightforward privilege escalation vector. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and limited privileges required. Although no known exploits are reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant threat. The affected versions are not explicitly enumerated but pertain to ABRT daemon versions prior to the patch. The vulnerability was published on December 3, 2025, with the Fedora project as the assigner. No official patches or mitigations are linked yet, indicating the need for immediate attention from system administrators.

Potential Impact

This vulnerability allows an unprivileged local attacker to escalate privileges to root by injecting arbitrary commands into a root-executed shell command. Successful exploitation compromises system confidentiality by allowing access to sensitive data, integrity by enabling modification or deletion of files and system configurations, and availability by potentially disabling system services or causing system crashes. Organizations relying on ABRT for crash reporting on Fedora or similar Linux distributions face significant risk of local privilege escalation, which can be a stepping stone for further attacks such as lateral movement, persistence, or full system compromise. The vulnerability's ease of exploitation and high impact make it critical for environments with multiple users or where local user accounts are less strictly controlled. Additionally, containerized environments using Docker inspected by ABRT may be indirectly affected, increasing the attack surface.

Mitigation Recommendations

1. Immediately restrict local user access to systems running vulnerable ABRT daemon versions to trusted personnel only. 2. Disable or uninstall the ABRT daemon if crash reporting is not essential, reducing the attack surface. 3. Monitor and audit local user activities for suspicious command injection attempts or abnormal ABRT behavior. 4. Apply vendor patches as soon as they become available; track Fedora security advisories for updates. 5. Implement mandatory access controls (e.g., SELinux, AppArmor) to confine ABRT daemon privileges and prevent unauthorized command execution. 6. Employ input validation and sanitization in any custom scripts or tools interacting with ABRT or Docker commands. 7. Use container security best practices to limit Docker command exposure and isolate container management processes. 8. Conduct regular vulnerability assessments and penetration testing focusing on local privilege escalation vectors. These steps go beyond generic advice by emphasizing access restriction, daemon confinement, and proactive monitoring until patches are deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-11-05T11:48:30.039Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692ff91810a8757052587e1b

Added to database: 12/3/2025, 8:47:20 AM

Last enriched: 2/27/2026, 9:04:31 PM

Last updated: 3/25/2026, 5:13:19 AM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses