Bug 2396641 (CVE-2025-10725) - CVE-2025-10725 openshift-ai: Overly Permissive ClusterRole Allows Authenticated Users to Escalate Privileges to Cluster Admin
Summary: CVE-2025-10725 openshift-ai: Overly Permissive ClusterRole Allows Authenticat...
Keywords:
Status: NEW
Alias: CVE-2025-10725
Deadline: 2025-10-31
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-19 08:46 UTC by OSIDB Bzimport
Modified: 2025-10-02 06:13 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-09-19 08:46:11 UTC
OpenShift AI includes a ClusterRole named kueue-batch-user-role that is
incorrectly bound to the system:authenticated group. This grants any
authenticated entity, including low-privileged service accounts for user
workbenches, the permission to create OpenShift Jobs in any namespace. An
attacker can abuse this permission to schedule a malicious Job in a
privileged namespace (e.g., openshift-apiserver-operator), configuring it
to run with a high-privilege ServiceAccount. The Job can then exfiltrate
the ServiceAccount token, allowing the attacker to progressively pivot and
compromise more powerful accounts, ultimately achieving root access on
cluster master nodes and leading to a full cluster takeover.
Impact

A low-privileged attacker with access to an authenticated account, such as
a data scientist using a standard Jupyter notebook, can escalate their
privileges to a full cluster administrator. This allows for the complete
compromise of the cluster's confidentiality, integrity, and availability.
The attacker can steal sensitive data, disrupt all services, and take
control of the underlying infrastructure, leading to a total breach of the
platform and all applications hosted on it.
Recommendations

Remove the ClusterRoleBinding that associates the kueue-batch-user-role
with the system:authenticated group. The permission to create jobs should
be granted on a more granular, as-needed basis to specific users or groups,
adhering to the principle of least privilege. Avoid granting broad
permissions to system-level groups.
References

* OWASP Top 10: A01:2021 – Broken Access Control:
https://owasp.org/Top10/A01_2021-Broken_Access_Control/

* OpenShift Documentation: Using RBAC to define and apply permissions:
https://docs.openshift.com/container-platform/latest/authentication/using-rbac.html


Note You need to log in before you can comment on or make changes to this bug.