CVE-2025-12801

A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:linux-nfs:nfs-utils:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-04 16:16

Updated : 2026-03-25 05:16


NVD link : CVE-2025-12801

Mitre link : CVE-2025-12801

CVE.ORG link : CVE-2025-12801


JSON object : View

Products Affected

redhat

  • openshift_container_platform
  • enterprise_linux

linux-nfs

  • nfs-utils
CWE
CWE-279

Incorrect Execution-Assigned Permissions

CWE-732

Incorrect Permission Assignment for Critical Resource