Vulnerability Description
A container privilege escalation flaw was found in certain Red Hat Process Automation Manager images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Process Automation Manager | 7.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2025-58713Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2394419Issue TrackingVendor Advisory
FAQ
What is CVE-2025-58713?
CVE-2025-58713 is a vulnerability with a CVSS score of 6.4 (MEDIUM). A container privilege escalation flaw was found in certain Red Hat Process Automation Manager images. This issue stems from the /etc/passwd file being created with group-writable permissions during bu...
How severe is CVE-2025-58713?
CVE-2025-58713 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-58713?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Process Automation Manager.