{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T08:21:16.751","vulnerabilities":[{"cve":{"id":"CVE-2025-57852","sourceIdentifier":"secalert@redhat.com","published":"2025-09-30T15:15:53.720","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container."},{"lang":"es","value":"Una falla de escalada de privilegios de contenedor fue encontrada en las imágenes de contenedor de KServe ModelMesh. Este problema se origina en que el archivo /etc /passwd es creado con permisos de escritura para el grupo durante el tiempo de compilación. En ciertas condiciones, un atacante que puede ejecutar comandos dentro de un contenedor afectado, incluso como un usuario no-root, puede aprovechar su membresía en el grupo root para modificar el archivo /etc /passwd. Esto podría permitir al atacante añadir un nuevo usuario con cualquier UID arbitrario, incluyendo UID 0, lo que lleva a privilegios de root completos dentro del contenedor."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.5,"impactScore":5.9}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-276"}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2025:16981","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:16982","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:16983","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:16984","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:17501","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2025-57852","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2391105","source":"secalert@redhat.com"}]}}]}