Home

Description

A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.

PUBLISHED Reserved 2025-11-06 | Published 2026-03-04 | Updated 2026-03-04 | Assigner redhat




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

Incorrect Execution-Assigned Permissions

Product status

Default status
affected

Default status
unknown

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-11-06:Reported to Red Hat.
2026-03-04:Made public.

References

access.redhat.com/security/cve/CVE-2025-12801 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2413081 (RHBZ#2413081) issue-tracking

cve.org (CVE-2025-12801)

nvd.nist.gov (CVE-2025-12801)

Download JSON