5.9
CVE-2025-6193
- EPSS 0.18%
- Published 20.06.2025 15:54:13
- Last modified 02.09.2025 19:15:32
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A command injection vulnerability was discovered in the TrustyAI Explainability toolkit. Arbitrary commands placed in certain fields of a LMEValJob custom resource (CR) may be executed in the LMEvalJob pod's terminal. This issue can be exploited via a maliciously crafted LMEvalJob by a user with permissions to deploy a CR.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/trustyai-explainability/trustyai-service-operator
≫
Package
trustyAI
Default Statusunaffected
Version <=
1.38
Version
0
Status
affected
VendorRed Hat
≫
Product
Red Hat OpenShift AI (RHOAI)
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat OpenShift AI (RHOAI)
Default Statusaffected
VendorRed Hat
≫
Product
Red Hat OpenShift AI (RHOAI)
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat OpenShift AI (RHOAI)
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat OpenShift AI (RHOAI)
Default Statusaffected
VendorRed Hat
≫
Product
Red Hat OpenShift AI (RHOAI)
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.18% | 0.402 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 5.9 | 1.7 | 3.7 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.