A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-31761 A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it.
Fixes

Solution

No solution given by the vendor.


Workaround

RHOAI versions 2.16.x The recommended fix is to upgrade to version 2.16.3. However, if Kueue features are not required, the Kueue component management state can be set to "Removed" in the RHOAI DataScienceCluster resource: ~~~ oc patch dsc default-dsc --type=merge -p='{"spec":{"components":{"kueue":{"managementState":"Removed"}}}}' -n redhat-ods-operator ~~~ RHOAI versions 2.19+ The recommended fix is to apply the available erratum. Alternatively, follow these steps: 1. Prevent the RHOAI operator from managing the kueue-batch-user-rolebinding by applying the necessary annotation: ~~~ oc patch clusterrolebinding kueue-batch-user-rolebinding -p '{"metadata":{"annotations": \{"opendatahub.io/managed":"false"}}}' ~~~ 2. Disable the ClusterRoleBinding by updating its subject to a different, non-existent, group: ~~~ oc patch clusterrolebinding kueue-batch-user-rolebinding \ -p '{ "subjects": [ { "kind": "Group", "name": "REPLACEME", "apiGroup": "rbac.authorization.k8s.io" } ] }' ~~~ It is important that the group used for the subject does not exist on the cluster to prevent the risk of unintentionally assigning these permissions to other non-privileged users. 3. Once updates providing fixes have been applied, it's recommended to remove the clusterrolebinding created in step 2 of the mitigation. ~~~ oc delete clusterrolebinding kueue-batch-user-rolebinding ~~~

History

Fri, 03 Oct 2025 11:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift_ai

Thu, 02 Oct 2025 16:30:00 +0000


Thu, 02 Oct 2025 15:30:00 +0000

Type Values Removed Values Added
References

Thu, 02 Oct 2025 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift_ai:2.16::el8
cpe:/a:redhat:openshift_ai:2.22::el9
References

Wed, 01 Oct 2025 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift_ai:2.19::el8
cpe:/a:redhat:openshift_ai:2.21::el9
References

Tue, 30 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 18:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it.
Title openshift-ai: Overly Permissive ClusterRole Allows Authenticated Users to Escalate Privileges to Cluster Admin Openshift-ai: overly permissive clusterrole allows authenticated users to escalate privileges to cluster admin
First Time appeared Redhat
Redhat openshift Ai
CPEs cpe:/a:redhat:openshift_ai
Vendors & Products Redhat
Redhat openshift Ai
References

Tue, 30 Sep 2025 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title openshift-ai: Overly Permissive ClusterRole Allows Authenticated Users to Escalate Privileges to Cluster Admin
Weaknesses CWE-266
References
Metrics threat_severity

None

cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-10-06T14:14:40.017Z

Reserved: 2025-09-19T13:40:32.975Z

Link: CVE-2025-10725

cve-icon Vulnrichment

Updated: 2025-09-30T18:32:37.705Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-30T18:15:47.900

Modified: 2025-10-02T19:12:17.160

Link: CVE-2025-10725

cve-icon Redhat

Severity : Important

Publid Date: 2025-09-29T00:00:00Z

Links: CVE-2025-10725 - Bugzilla

cve-icon OpenCVE Enrichment

No data.