Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57850: Incorrect Default Permissions in Red Hat Red Hat OpenShift Dev Spaces

0
Medium
VulnerabilityCVE-2025-57850cvecve-2025-57850
Published: Tue Dec 02 2025 (12/02/2025, 18:53:35 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Dev Spaces

Description

A container privilege escalation flaw was found in certain CodeReady Workspaces images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/15/2026, 00:50:28 UTC

Technical Analysis

CVE-2025-57850 is a container privilege escalation vulnerability identified in certain CodeReady Workspaces images used within Red Hat OpenShift Dev Spaces. The root cause is the /etc/passwd file being created with group-writable permissions during the container image build process. This misconfiguration allows any user who can execute commands inside the container and who is a member of the root group to modify the /etc/passwd file. By doing so, the attacker can add a new user entry with any arbitrary user ID, including UID 0, which corresponds to the root user. This effectively grants the attacker full root privileges within the container environment. The vulnerability requires that the attacker already has command execution capabilities inside the container and elevated group privileges, but does not require further user interaction. The CVSS 3.1 base score is 6.4, reflecting medium severity, with attack vector local, attack complexity high, privileges required high, no user interaction, and high impact on confidentiality, integrity, and availability within the container. While this vulnerability does not directly impact the host system, gaining root privileges inside a container can allow attackers to bypass container-level security controls, potentially leading to lateral movement or data compromise within the containerized environment. No exploits are currently known in the wild, but the issue highlights the importance of secure container image build practices and strict file permission management. Red Hat OpenShift Dev Spaces users should monitor for patches and advisories from Red Hat and audit their container images for similar permission issues.

Potential Impact

The primary impact of CVE-2025-57850 is the potential for attackers with existing container access and root group membership to escalate privileges to root within the container. This can lead to full compromise of the container environment, including unauthorized access to sensitive data, modification or deletion of files, and disruption of containerized applications. Although the vulnerability does not directly allow host-level compromise, attackers with root in the container can attempt to exploit other vulnerabilities or misconfigurations to break out of the container sandbox. For organizations deploying Red Hat OpenShift Dev Spaces and CodeReady Workspaces, this vulnerability could undermine container isolation and security policies, increasing the risk of insider threats or lateral movement within cloud-native environments. The medium CVSS score indicates a moderate risk, but the impact on confidentiality, integrity, and availability within affected containers is high. Enterprises relying heavily on containerized development environments and DevOps pipelines may face operational disruptions and potential data breaches if this vulnerability is exploited.

Mitigation Recommendations

1. Apply official patches and updates from Red Hat for OpenShift Dev Spaces and CodeReady Workspaces images as soon as they become available. 2. Audit container image build processes to ensure that critical system files like /etc/passwd are created with secure, non-group-writable permissions. 3. Restrict membership of the root group within containers to the minimum necessary users to reduce the risk of privilege escalation. 4. Implement runtime security controls and monitoring to detect unauthorized modifications to critical files inside containers. 5. Use container security scanning tools to identify insecure file permissions and configuration issues before deployment. 6. Enforce the principle of least privilege for container users and processes, avoiding unnecessary elevated group memberships. 7. Consider using container image signing and verification to prevent deployment of vulnerable or tampered images. 8. Regularly review and update container security policies and access controls within OpenShift environments to limit attack surface. 9. Educate developers and DevOps teams about secure container image creation and the risks of improper file permissions. 10. Monitor security advisories from Red Hat and related communities for emerging threats and recommended best practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-08-21T14:40:40.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692f388ae0601f8fcd7a94fc

Added to database: 12/2/2025, 7:05:46 PM

Last enriched: 3/15/2026, 12:50:28 AM

Last updated: 3/26/2026, 6:39:50 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses