{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:23:13.680","vulnerabilities":[{"cve":{"id":"CVE-2025-46717","sourceIdentifier":"security-advisories@github.com","published":"2025-05-12T15:16:01.260","lastModified":"2025-07-09T01:51:08.943","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability."},{"lang":"es","value":"sudo-rs es una implementación de sudo y su con memoria segura, escrita en Rust. Antes de la versión 0.2.6, los usuarios sin privilegios de sudo (o con privilegios muy limitados) podían determinar si existían archivos en carpetas a las que de otro modo no podrían acceder mediante `sudo --list `. Los usuarios con acceso local a una máquina pueden descubrir la existencia o inexistencia de ciertos archivos, revelando información potencialmente sensible en sus nombres. Esta información también puede utilizarse en combinación con otros ataques. La versión 0.2.6 corrige esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-497"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trifectatech:sudo:*:*:*:*:*:rust:*:*","versionEndExcluding":"0.2.6","matchCriteriaId":"FC98CE22-CA46-419B-ACDE-21E0AC76561B"}]}]}],"references":[{"url":"https://github.com/trifectatechfoundation/sudo-rs/releases/tag/v0.2.6","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-98cv-wqjx-wx8f","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-98cv-wqjx-wx8f","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}