CVE-2025-53882
BaseFortify
Publication date: 2025-07-23
Last updated on: 2025-09-03
Assigner: SUSE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opensuse | python-mailman | * |
| opensuse | logrotate | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-807 | The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Reliance on Untrusted Inputs in a Security Decision within the logrotate configuration for the openSUSE mailman3 package. It allows a potential escalation of privileges from the mailman user to root, meaning an attacker could exploit this flaw to gain root-level access on the affected system.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker with access to the mailman user account to escalate their privileges to root, potentially gaining full control over the affected system. This could lead to unauthorized access, modification, or deletion of data and system compromise.