CVE-2025-58060
Alma Linux vulnerability analysis and mitigation

Overview

CVE-2025-58060 is a high-severity authentication bypass vulnerability discovered in CUPS (Common UNIX Printing System). The vulnerability was disclosed on September 11, 2025, affecting CUPS versions prior to 2.4.13. The issue occurs when the AuthType is set to anything other than Basic, where if the request contains an Authorization: Basic header, the password validation is completely bypassed (GHSA Advisory).

Technical details

The vulnerability exists in the cupsdAuthorize() function within the scheduler/auth.c file. When the Authorization header is set to Basic, but the authentication type is not CUPSDAUTHBASIC, the password verification step is skipped entirely. This occurs specifically when handling authentication types other than Basic authentication. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (GHSA Advisory).

Impact

The vulnerability allows attackers to bypass authentication entirely when CUPS is configured with any AuthType other than Basic. An attacker can gain unauthorized access by sending a request with a Basic Authorization header containing any administrator username and an arbitrary password. This results in complete authentication bypass, potentially leading to unauthorized access to printing resources and administrative functions (GHSA Advisory).

Mitigation and workarounds

A patch has been developed that adds validation to block authentication using alternate methods. The fix includes additional checks in the cupsdAuthorize function to ensure proper authentication type validation. The patch is available in the CUPS repository and has been distributed to various Linux distributions for implementation (CUPS Commit).

Community reactions

Multiple Linux distributions have acknowledged the vulnerability and released security updates, including Ubuntu which has issued USN-7745-1 to address the vulnerability across multiple versions of their operating system (Ubuntu Notice).

Additional resources


SourceThis report was generated using AI

Related Alma Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-9185HIGH8.1
  • NixOSNixOS
  • MozillaFirefox-translations-common
NoYesAug 19, 2025
CVE-2025-9180HIGH8.1
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox
NoYesAug 19, 2025
CVE-2025-58060HIGH8
  • Alma LinuxAlma Linux
  • cups-libs-debuginfo
NoYesSep 11, 2025
CVE-2025-9182HIGH7.5
  • NixOSNixOS
  • MozillaFirefox
NoYesAug 19, 2025
CVE-2025-9181MEDIUM6.5
  • NixOSNixOS
  • firefox
NoYesAug 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management