Home

Description

A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it.

PUBLISHED Reserved 2025-09-19 | Published 2025-09-30 | Updated 2025-10-01 | Assigner redhat




CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

Incorrect Privilege Assignment

Product status

Default status
affected

sha256:03e5cbae0925efac7fd0adfb14f4317c48a7efdbdd54c7804db92a2efb3b2bfc before *
unaffected

Default status
affected

sha256:9f7620cc36c23dbf8528ecc04742861a65e867b338c582b84055559ab553f857 before *
unaffected

Default status
affected

Timeline

2025-09-19:Reported to Red Hat.
2025-09-29:Made public.

References

access.redhat.com/errata/RHBA-2025:16983 (RHBA-2025:16983) vendor-advisory

access.redhat.com/errata/RHBA-2025:16984 (RHBA-2025:16984) vendor-advisory

access.redhat.com/security/cve/CVE-2025-10725 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2396641 (RHBZ#2396641) issue-tracking

cve.org (CVE-2025-10725)

nvd.nist.gov (CVE-2025-10725)

Download JSON