Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3577 articles · 106538 vulns · 38/41 feeds (7d)
← Back to list
6.4
CVE-2025-57853
red hat · red hat web terminal

Web-terminal: privilege escalation via excessive /etc/passwd permissions

Description

A container privilege escalation flaw was found in certain Web Terminal images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Affected Products

VendorProductVersions
red hatred hat web terminal—

References

  • https://access.redhat.com/security/cve/CVE-2025-57853(vdb-entry, x_refsource_REDHAT)
  • https://bugzilla.redhat.com/show_bug.cgi?id=2391106(issue-tracking, x_refsource_REDHAT)

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2025-57853 | Red Hat Web Terminal default permission
→ No new info (linked only)
CVSS 3.16.4 NONE
CISA KEV❌ No
Actively exploited❌ No
CWECWE-276
PublishedApr 8, 2026
Last enriched4h agov2
Trending Score25
Source articles1
Independent1
Info Completeness7/14
Missing: versions, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-4634EXP
Keycloak: keycloak: denial of service via excessive processing of openid connect scope parameters
Trending: 57
HIGHCVE-2026-4636EXP
Keycloak: keycloak: uma policy bypass allows authenticated users to gain unauthorized access to victim-owned resources.
Trending: 55
NONECVE-2026-5745EXP
Libarchive: a null pointer dereference vulnerability exists in the acl parser of libarchive
Trending: 49
NONECVE-2026-3872EXP
Keycloak: keycloak: information disclosure due to redirect_uri validation bypass
Trending: 47
NONECVE-2026-4282EXP
Keycloak: keycloak: privilege escalation via forged authorization codes due to singleuseobjectprovider isolation flaw
Trending: 47

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 8, 2026
Discovered by ZDM
Apr 8, 2026
Updated: description, severity
Apr 8, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated severity to CRITICAL, corrected exploit availability, and provided a new description.

descriptionseverity
via VulDB
v14h ago

Initial creation