We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49842

conda-forge-webservices Privilege Escalation Risk via Default Docker Root User



Description

conda-forge-webservices is the web app deployed to run conda-forge admin commands and linting. Prior to version 2025.3.24, the conda_forge_webservice Docker container executes commands without specifying a user. By default, Docker containers run as the root user, which increases the risk of privilege escalation and host compromise if a vulnerability is exploited. This issue has been patched in version 2025.3.24.

Reserved 2025-06-11 | Published 2025-06-17 | Updated 2025-06-17 | Assigner GitHub_M


LOW: 1.0CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U

Problem types

CWE-276: Incorrect Default Permissions

Product status

< 2025.3.24
affected

References

github.com/...rvices/security/advisories/GHSA-3cj6-wc22-wvpv

github.com/...ommit/c28b67f833f32299cc47eef8ad226ca991db67ae

cve.org (CVE-2025-49842)

nvd.nist.gov (CVE-2025-49842)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49842

Support options

Helpdesk Chat, Email, Knowledgebase