{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T03:10:47.816","vulnerabilities":[{"cve":{"id":"CVE-2025-32462","sourceIdentifier":"cve@mitre.org","published":"2025-06-30T21:15:30.080","lastModified":"2025-11-03T20:18:27.727","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines."},{"lang":"es","value":"Sudo anterior a 1.9.17p1, cuando se usa con un archivo sudoers que especifica un host que no es ni el host actual ni ALL, permite a los usuarios enumerados ejecutar comandos en máquinas no deseadas."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N","baseScore":2.8,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":6.0}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","versionEndExcluding":"1.9.17","matchCriteriaId":"F87EA85C-7218-4B4A-BEDD-3E659E0F1844"},{"vulnerable":true,"criteria":"cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*","matchCriteriaId":"B563C690-EE9A-437C-9410-54209F82F827"}]}]}],"references":[{"url":"https://access.redhat.com/security/cve/cve-2025-32462","source":"cve@mitre.org"},{"url":"https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32462","source":"cve@mitre.org"},{"url":"https://explore.alas.aws.amazon.com/CVE-2025-32462.html","source":"cve@mitre.org"},{"url":"https://lists.debian.org/debian-security-announce/2025/msg00118.html","source":"cve@mitre.org"},{"url":"https://security-tracker.debian.org/tracker/CVE-2025-32462","source":"cve@mitre.org"},{"url":"https://ubuntu.com/security/notices/USN-7604-1","source":"cve@mitre.org"},{"url":"https://www.openwall.com/lists/oss-security/2025/06/30/2","source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.sudo.ws/releases/changelog/","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://www.sudo.ws/security/advisories/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.sudo.ws/security/advisories/host_any/","source":"cve@mitre.org"},{"url":"https://www.suse.com/security/cve/CVE-2025-32462.html","source":"cve@mitre.org"},{"url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00033.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}