CVE-2025-12744
DOCUMENTATION: A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.
STATEMENT: The Red Hat Product Security team has assessed this vulnerability as High. It can be triggered locally by an unprivileged user with access to the ABRT socket and allows execution of arbitrary commands as root, resulting in full system compromise. The root cause is unsanitized user input being passed to a shell.
MITIGATION: Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://access.redhat.com/security/cve/CVE-2025-12744
