CVE-2025-52991
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-27

Last updated on: 2025-06-30

Assigner: MITRE

Description
The Nix, Lix, and Guix package managers default to using temporary build directories in a world-readable and world-writable location. This allows standard users to deceive the package manager into using directories with pre-existing content, potentially leading to unauthorized actions or data manipulation. This affects Nix before 2.24.15, 2.26.4, 2.28.4, and 2.29.1; Lix before 2.91.2, 2.92.2, and 2.93.1; and Guix before 1.4.0-38.0e79d5b.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-27
Last Modified
2025-06-30
Generated
2026-05-06
AI Q&A
2025-06-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the Nix, Lix, and Guix package managers using temporary build directories in locations that are world-readable and world-writable. This setup allows standard users to trick the package manager into using directories that already contain files, potentially causing unauthorized actions or manipulation of data during the build process. [1]


How can this vulnerability impact me? :

The vulnerability can lead to privilege escalation where an unprivileged user can deceive the package manager into using manipulated directories, potentially causing unauthorized actions or data manipulation. This could compromise the integrity of the package build process and lead to security risks on the affected system. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the affected package managers (Nix, Lix, Guix) to versions that have patched the vulnerability once they become available. Currently, no fixed versions are available in some branches such as the unstable Debian branch. Monitoring the official Guix codebase and Debian security tracker for patches and applying them promptly is recommended. Until patches are applied, restrict access to temporary build directories to prevent unauthorized users from exploiting the world-readable and world-writable default locations. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart