CVE-2025-32463
Wolfi vulnerability analysis and mitigation

Overview

CVE-2025-32463 is a critical local privilege escalation vulnerability in Sudo versions 1.9.14 to 1.9.17. The vulnerability allows local users to obtain root access by exploiting Sudo's -R (--chroot) option, even when they are not listed in the sudoers file. The flaw was discovered in June 2025 and was assigned a CVSS score of 9.3 (Critical) (Ubuntu Security, Sudo Advisory).

Technical details

The vulnerability stems from a change made in Sudo 1.9.14 where paths are resolved within the chroot environment before evaluating the sudoers file. An attacker can exploit this by creating a malicious /etc/nsswitch.conf file under a user-specified root directory, which instructs Sudo to load arbitrary shared libraries like libnss_/woot1337.so.2. This implementation flaw allows for path resolution manipulation during the sudoers file evaluation process (Openwall, Security Online).

Impact

The vulnerability enables any local user to execute arbitrary commands with root privileges, effectively bypassing all security controls in the sudoers file. This represents a critical security breach as it allows complete system compromise by local users, regardless of their assigned permissions (NVD, Security Online).

Mitigation and workarounds

The vulnerability has been fixed in Sudo version 1.9.17p1. The fix reverts the changes made in version 1.9.14 and deprecates the --chroot feature entirely. The patch removes the pivot_root() logic, making it impossible to call chroot() during command matching. System administrators are strongly advised to upgrade to version 1.9.17p1 or later (Sudo Advisory, Openwall).

Community reactions

The vulnerability has received significant attention due to its critical severity and the widespread use of Sudo in Unix-like systems. Major Linux distributions, including Ubuntu, have issued high-priority security advisories and patches. The security community has emphasized the importance of immediate patching due to the ease of exploitation and the availability of proof-of-concept code (Ubuntu Security, Security Online).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management