CVE-2025-32462
NixOS vulnerability analysis and mitigation

Overview

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines. The vulnerability was discovered in June 2025 and affects sudo versions 1.8.8 through 1.9.17. This security flaw has been assigned CVE-2025-32462 and carries a CVSS base score of 2.8 (LOW) (MITRE, Sudo Advisory).

Technical details

The vulnerability stems from sudo's host (-h or --host) option, which was intended only for use with the list option (-l or --list) to display privileges on other hosts. Due to a bug, this option was not properly restricted and could be used when executing commands or editing files. The flaw allows users to bypass host-specific restrictions in the sudoers file by specifying a different host using the -h option, effectively making the hostname portion of sudoers rules irrelevant (Oligo Security, Sudo Advisory).

Impact

The vulnerability enables users with sudo access on one host to potentially execute commands on any other host where they have sudo privileges, even if the current host is not explicitly authorized. This primarily affects organizations using common sudoers files distributed across multiple machines or LDAP-based sudoers configurations (Openwall).

Mitigation and workarounds

The vulnerability has been fixed in sudo version 1.9.17p1. Organizations should update to this version or apply distribution-specific patches. For systems that cannot be immediately updated, administrators should review host-specific rules in sudoers files and consider converting them to group-based or tag-based controls where possible. The fix ensures the -h option is rejected unless used with the -l option (Oligo Security).

Community reactions

Major Linux distributions including Ubuntu, Debian, and Red Hat have released security advisories and patches for their respective versions. Security researchers have emphasized the importance of prompt patching, particularly for organizations using distributed sudoers configurations (SecPod).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management