Home

Description

A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster's main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle. This allows a standard user within the cluster to send unauthorized commands to the management platform, effectively acting with the full permissions of the cluster administrator. This could lead to unauthorized changes to the cluster's configuration or status on the Red Hat platform.

PUBLISHED Reserved 2025-10-07 | Published 2025-12-15 | Updated 2025-12-15 | Assigner redhat




HIGH: 8.7CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Problem types

Unintended Proxy or Intermediary ('Confused Deputy')

Product status

Default status
unknown

Timeline

2025-10-07:Reported to Red Hat.
2025-12-15:Made public.

References

access.redhat.com/security/cve/CVE-2025-11393 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2402032 (RHBZ#2402032) issue-tracking

cve.org (CVE-2025-11393)

nvd.nist.gov (CVE-2025-11393)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.