{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-5417","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2025-05-31T22:36:52.134Z","datePublished":"2025-08-19T04:28:08.316Z","dateUpdated":"2025-12-19T21:53:15.616Z"},"containers":{"cna":{"title":"Rhdh: red hat developer hub user permissions","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"An insufficient access control vulnerability was found in the Red Hat\nDeveloper Hub rhdh/rhdh-hub-rhel9 container image. The Red Hat Developer Hub cluster admin/user, who has standard user access to the cluster, and the Red Hat Developer Hub namespace, can access the\nrhdh/rhdh-hub-rhel9 container image and modify the image's content. This issue affects the confidentiality and integrity of the data, and any changes made are not permanent, as they reset after the pod restarts."}],"affected":[{"vendor":"Red Hat","product":"Red Hat Developer Hub","versions":[{"status":"affected","version":"0","lessThan":"1.7.0","versionType":"semver"}],"packageName":"rhdh","collectionURL":"https://github.com/redhat-developer/rhdh","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat Developer Hub 1.7","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhdh/rhdh-hub-rhel9","defaultStatus":"affected","versions":[{"version":"sha256:aa3c5b50c65aee51b932fafcbf479ce54f15496cffc2744860bd9e135cce815c","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhdh:1.7::el9"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2025:14090","name":"RHSA-2025:14090","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2025-5417","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2369602","name":"RHBZ#2369602","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2025-08-19T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-266","description":"Incorrect Privilege Assignment","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-266: Incorrect Privilege Assignment","workarounds":[{"lang":"en","value":"Red Hat Developer Hub 1.5 contains mitigation guidelines present at https://docs.redhat.com/en/documentation/red_hat_developer_hub/1.5/html/configuring_red_hat_developer_hub/readonlyrootfilesystem"}],"timeline":[{"lang":"en","time":"2025-05-31T22:35:41.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-08-19T00:00:00.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2025-12-19T21:53:15.616Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-19T19:21:17.678963Z","id":"CVE-2025-5417","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-19T19:21:23.637Z"}}]}}