CVE-2012-10022
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-01

Last updated on: 2025-08-06

Assigner: VulnCheck

Description
Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-01
Last Modified
2025-08-06
Generated
2026-05-06
AI Q&A
2025-08-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
lxlabs kloxo 6.1.6
lxlabs kloxo 6.1.12
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

Kloxo versions 6.1.12 and earlier have two setuid root binaries, lxsuexec and lxrestart, that allow local users with uid 48 (typically Apache user) to escalate their privileges to root. The lxsuexec binary checks if the user has uid 48 and then permits execution of arbitrary commands as root, enabling attackers with Apache-level access to gain root privileges without authentication.


How can this vulnerability impact me? :

This vulnerability allows an attacker who has Apache-level access (uid 48) to escalate their privileges to root on the affected system. This means an attacker can gain full control over the system, potentially leading to unauthorized access, data theft, system compromise, and disruption of services.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart