Vulnerability Description
A container privilege escalation flaw was found in certain AMQ Broker images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2025:17562
- https://access.redhat.com/security/cve/CVE-2025-58712
- https://bugzilla.redhat.com/show_bug.cgi?id=2394418
FAQ
What is CVE-2025-58712?
CVE-2025-58712 is a vulnerability with a CVSS score of 6.4 (MEDIUM). A container privilege escalation flaw was found in certain AMQ Broker images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain con...
How severe is CVE-2025-58712?
CVE-2025-58712 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-58712?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.