CVE-2025-57851

A container privilege escalation flaw was found in certain Multicluster Engine for Kubernetes images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:-:*:*:*:*:*:*:*

History

01 May 2026, 20:30

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2025-57851 - () https://access.redhat.com/security/cve/CVE-2025-57851 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2391104 - () https://bugzilla.redhat.com/show_bug.cgi?id=2391104 - Issue Tracking, Vendor Advisory
First Time Redhat
Redhat advanced Cluster Management For Kubernetes
CPE cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:-:*:*:*:*:*:*:*

08 Apr 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 14:16

Updated : 2026-05-01 20:30


NVD link : CVE-2025-57851

Mitre link : CVE-2025-57851

CVE.ORG link : CVE-2025-57851


JSON object : View

Products Affected

redhat

  • advanced_cluster_management_for_kubernetes
CWE
CWE-276

Incorrect Default Permissions