CVE-2025-8766
Plain English Summary
AI-powered analysis for quick understanding
An attacker can gain full root privileges within a vulnerable container by modifying the system's user file, allowing them to create a new user with administrative rights. This can happen if they can run commands inside the container and are part of the root group, taking advantage of a misconfigured file permission during the container's setup.
Technical Description
A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 13, 2026
25 days ago
Last Modified
Mar 16, 2026
22 days ago