We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46718

sudo-rs Allows Low Privilege Users to Enumerate Privileges of Others



Description

sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with limited sudo privileges (e.g. execution of a single command) can list sudo privileges of other users using the `-U` flag. This vulnerability allows users with limited sudo privileges to enumerate the sudoers file, revealing sensitive information about other users' permissions. Attackers can collect information that can be used to more targeted attacks. Systems where users either do not have sudo privileges or have the ability to run all commands as root through sudo (the default configuration on most systems) are not affected by this advisory. Version 0.2.6 fixes the vulnerability.

Reserved 2025-04-28 | Published 2025-05-12 | Updated 2025-05-12 | Assigner GitHub_M


LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere

Product status

< 0.2.6
affected

References

github.com/...udo-rs/security/advisories/GHSA-w9q3-g4p5-5q2r

github.com/...ectatechfoundation/sudo-rs/releases/tag/v0.2.6

cve.org (CVE-2025-46718)

nvd.nist.gov (CVE-2025-46718)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46718

Support options

Helpdesk Chat, Email, Knowledgebase