CVE-2025-6193
BaseFortify
Publication date: 2025-06-20
Last updated on: 2026-03-25
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-6193 is a command injection vulnerability in the TrustyAI Explainability toolkit. It occurs when arbitrary commands are placed in certain fields of a LMEvalJob custom resource (CR), which may then be executed in the terminal of the LMEvalJob pod. This allows an attacker with permissions to deploy a CR to execute arbitrary commands within the pod, potentially escaping the intended execution context of the 'lmeval' Python command. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with deployment permissions to execute arbitrary commands within the LMEvalJob pod on Linux systems. This could lead to unauthorized actions such as data manipulation, system compromise, or disruption of services running within the pod, potentially affecting the confidentiality, integrity, and availability of the affected system. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves monitoring deployments of the LMEvalJob Custom Resource (CR) for suspicious or unexpected command injections in its fields. Since the vulnerability allows arbitrary command execution within the LMEvalJob pod, inspecting the contents of LMEvalJob CRs for unusual command strings or patterns is recommended. Additionally, monitoring pod logs for unexpected command executions or errors related to the 'lmeval' Python command may help identify exploitation attempts. Specific commands are not provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting permissions to deploy LMEvalJob Custom Resources only to trusted users, as exploitation requires deployment privileges. Monitoring and auditing LMEvalJob CR deployments for suspicious content is advised. Since no fixed version is specified, applying any available patches or updates from the vendor once released is important. Additionally, consider isolating or limiting the privileges of the LMEvalJob pods to reduce potential impact from command injection. [1]