Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-7195
Awaiting Analysis
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-07 Aug, 2025 | 19:15
Updated At-24 Mar, 2026 | 15:16

Early versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images. In affected images, the /etc/passwd file is created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.4MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-276Secondarysecalert@redhat.com
CWE ID: CWE-276
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHEA-2025:23406secalert@redhat.com
N/A
https://access.redhat.com/errata/RHEA-2025:23478secalert@redhat.com
N/A
https://access.redhat.com/errata/RHEA-2026:0129secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:19332secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:19335secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:19958secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:19961secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:21368secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:21885secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:22415secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:22416secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:22418secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:22420secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:22683secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:22684secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23528secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23529secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23542secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2026:0627secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2026:0718secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2026:0722secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2026:0737secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2026:2572secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2026:5633secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2025-7195secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=2376300secalert@redhat.com
N/A
Hyperlink: https://access.redhat.com/errata/RHEA-2025:23406
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHEA-2025:23478
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHEA-2026:0129
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:19332
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:19335
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:19958
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:19961
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:21368
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:21885
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22415
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22416
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22418
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22420
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22683
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22684
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23528
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23529
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23542
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2026:0627
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2026:0718
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2026:0722
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2026:0737
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2026:2572
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2026:5633
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-7195
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2376300
Source: secalert@redhat.com
Resource: N/A
Change History
0Changes found

Details not found