A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Wed, 03 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 03 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 03 Dec 2025 08:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.
Title Abrt: command-injection in abrt leading to local privilege escalation
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-78
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published:

Updated: 2025-12-03T14:21:59.766Z

Reserved: 2025-11-05T11:48:30.039Z

Link: CVE-2025-12744

cve-icon Vulnrichment

Updated: 2025-12-03T14:21:53.408Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-03T09:15:46.390

Modified: 2025-12-04T17:15:08.283

Link: CVE-2025-12744

cve-icon Redhat

Severity : Important

Publid Date: 2025-12-03T07:51:30Z

Links: CVE-2025-12744 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses