Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58712: Incorrect Default Permissions in apache activemq-artemis

0
Medium
VulnerabilityCVE-2025-58712cvecve-2025-58712
Published: Wed Oct 22 2025 (10/22/2025, 18:19:06 UTC)
Source: CVE Database V5
Vendor/Project: apache
Product: activemq-artemis

Description

A container privilege escalation flaw was found in certain AMQ Broker images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 20:38:05 UTC

Technical Analysis

CVE-2025-58712 identifies a container privilege escalation vulnerability in certain Apache ActiveMQ Artemis broker container images. The root cause is the /etc/passwd file being created with group-writable permissions during the container image build process. This misconfiguration allows any user who can execute commands inside the container and who is a member of the root group to modify the /etc/passwd file. By altering this file, an attacker can add new user entries with arbitrary user IDs, including UID 0, effectively granting themselves root-level privileges within the container environment. This escalation of privileges can enable attackers to bypass container isolation and potentially compromise containerized applications or pivot to other parts of the host environment if container escape vulnerabilities exist. The vulnerability requires the attacker to have command execution capabilities inside the container and membership in the root group, which limits the ease of exploitation but still poses a significant risk in multi-tenant or shared container environments. The CVSS v3.1 base score is 6.4, reflecting medium severity due to the high impact on confidentiality, integrity, and availability within the container, but with a higher attack complexity and required privileges. No patches or exploits are currently publicly known, but the issue was published on October 22, 2025, and users should monitor for updates from Apache and their container image providers.

Potential Impact

This vulnerability allows an attacker with limited privileges inside an affected container to escalate to root privileges by modifying the /etc/passwd file. The impact includes full compromise of the container environment, enabling unauthorized access to sensitive data, modification or deletion of files, and disruption of containerized services. In environments where containers share resources or are orchestrated in clusters, this could lead to lateral movement or further compromise if combined with other vulnerabilities. Organizations relying on Apache ActiveMQ Artemis containers for messaging infrastructure may face service disruptions, data breaches, or unauthorized control over messaging workflows. The requirement for existing command execution and root group membership reduces the risk somewhat but does not eliminate it, especially in complex deployments with multiple users or automated processes running with elevated group privileges.

Mitigation Recommendations

1. Immediately audit and restrict group permissions on critical system files such as /etc/passwd within container images to ensure they are not group-writable. 2. Rebuild affected Apache ActiveMQ Artemis container images with corrected file permissions, removing group write access from /etc/passwd and other sensitive files. 3. Limit container user group memberships, avoiding inclusion of non-root users in privileged groups like root. 4. Implement strict container runtime security policies that prevent privilege escalation, such as using seccomp, AppArmor, or SELinux profiles tailored to restrict file modifications. 5. Monitor container environments for unexpected modifications to /etc/passwd or suspicious user additions. 6. Apply the latest security patches and updates from Apache and container image maintainers as they become available. 7. Consider running containers with minimal privileges and using user namespaces to isolate container user IDs from the host. 8. Employ container image scanning tools to detect insecure file permissions during the build and deployment pipeline.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-09-03T15:20:52.036Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f92183732d1470b7fcdfeb

Added to database: 10/22/2025, 6:25:07 PM

Last enriched: 3/7/2026, 8:38:05 PM

Last updated: 3/24/2026, 7:44:40 PM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses