Description

A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container

INFO

Published Date :

2026-03-13T02:48:19.748Z

Last Modified :

2026-03-13T02:48:19.748Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-8766 vulnerability.

Vendors Products
Redhat
  • Openshift Data Foundation
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-8766.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact