
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-6018 is a Local Privilege Escalation (LPE) vulnerability discovered in the PAM configuration of openSUSE Leap 15 and SUSE Linux Enterprise 15. The vulnerability allows an unprivileged local attacker, such as someone who logs in via SSH, to gain the privileges of a physical 'allow_active' user. The vulnerability was discovered and reported by Qualys researchers in June 2025 (Help Net Security, Openwall).
The vulnerability exists due to a misconfiguration in PAM where the pamenv module reads the user's ~/.pamenvironment file by default before the pamsystemd module is called. This allows attackers to set environment variables like XDGSEAT=seat0 and XDG_VTNR=1, effectively tricking the system into treating any local login as if the user were physically present at the console. The vulnerability has been confirmed to affect PAM version 1.3.0 and related configurations (Openwall).
When exploited, this vulnerability allows attackers to perform all the 'allow_active yes' polkit actions that are normally reserved for physical users. When chained with CVE-2025-6019, it enables a complete privilege escalation path from an unprivileged user to root access. This could lead to the ability to switch off EDR agents, implant backdoors, change configurations, and potentially launch wider organizational compromises (Help Net Security).
Major Linux distributions have started patching the vulnerability. Ubuntu has confirmed that default installations are not vulnerable due to their specific configuration of pamsystemd.so and pamenv.so modules. For systems that might be affected, it is recommended to ensure there are no pamenv.so userreadenv=1 invocations before pam_systemd.so in any of the PAM stacks defined under /etc/pam.d/. Organizations are advised to deploy patches without delay (Ubuntu Blog).
The security community has shown significant concern about this vulnerability, particularly due to its potential for chaining with CVE-2025-6019 to achieve root access. Saeed Abbasi, Senior Manager of Product Management for Security Research at Qualys, emphasized that these modern 'local-to-root' exploits have collapsed the gap between an ordinary logged-in user and full system takeover (Help Net Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”