Description

A container privilege escalation flaw was found in certain OpenShift Update Service (OSUS) images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

INFO

Published Date :

2026-04-08T13:55:06.739Z

Last Modified :

2026-04-08T14:42:32.600Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-57854 vulnerability.

Vendors Products
Redhat
  • Openshift Update Service
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-57854.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact