A flaw was found in polkit. When processing an XML policy with 32 or more nested elements in depth, an out-of-bounds write can be triggered. This issue can lead to a crash or other unexpected behavior, and arbitrary code execution is not discarded. To exploit this flaw, a high-privilege account is needed as it's required to place the malicious policy file properly.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-21350 A flaw was found in polkit. When processing an XML policy with 32 or more nested elements in depth, an out-of-bounds write can be triggered. This issue can lead to a crash or other unexpected behavior, and arbitrary code execution is not discarded. To exploit this flaw, a high-privilege account is needed as it's required to place the malicious policy file properly.
Fixes

Solution

No solution given by the vendor.


Workaround

There's no known mitigation to this vulnerability other than avoiding the implementation of unknown or untrusted polkit policy files to the system.

History

Mon, 11 Aug 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Container Platform
CPEs cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Redhat openshift Container Platform

Fri, 25 Jul 2025 17:45:00 +0000


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00014}


Mon, 14 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 14 Jul 2025 14:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in polkit. When processing an XML policy with 32 or more nested elements in depth, an out-of-bounds write can be triggered. This issue can lead to a crash or other unexpected behavior, and arbitrary code execution is not discarded. To exploit this flaw, a high-privilege account is needed as it's required to place the malicious policy file properly.
Title polkit: XML policy file with a large number of nested elements may lead to out-of-bounds write Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Sat, 12 Jul 2025 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title polkit: XML policy file with a large number of nested elements may lead to out-of-bounds write
Weaknesses CWE-787
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-09-25T02:46:04.834Z

Reserved: 2025-07-11T21:18:10.265Z

Link: CVE-2025-7519

cve-icon Vulnrichment

Updated: 2025-07-14T19:55:19.925Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-14T14:15:25.593

Modified: 2025-08-11T19:20:21.467

Link: CVE-2025-7519

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-07-11T00:00:00Z

Links: CVE-2025-7519 - Bugzilla

cve-icon OpenCVE Enrichment

No data.