A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster's main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle.
This allows a standard user within the cluster to send unauthorized commands to the management platform, effectively acting with the full permissions of the cluster administrator. This could lead to unauthorized changes to the cluster's configuration or status on the Red Hat platform.
References
Configurations
No configuration.
History
16 Dec 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-15 17:15
Updated : 2025-12-16 10:15
NVD link : CVE-2025-11393
Mitre link : CVE-2025-11393
CVE.ORG link : CVE-2025-11393
JSON object : View
Products Affected
No product.
CWE
CWE-441
Unintended Proxy or Intermediary ('Confused Deputy')
