Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-32462
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不正确
Source: NVD (National Vulnerability Database)
Vulnerability Title
Sudo 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于允许列出的用户在非预期机器上执行命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Sudo projectSudo 1.8.8 ~ 1.9.17p1 -
II. Public POCs for CVE-2025-32462
#POC DescriptionSource LinkShenlong Link
1POC script for CVE-2025-32462 a vulnerability in sudohttps://github.com/Hacksparo/CVE-2025-32462POC Details
2A easy sudo poc by cryingn.https://github.com/CryingN/CVE-2025-32462POC Details
3Exploit for CVE-2025-32462https://github.com/atomicjjbod/CVE-2025-32462POC Details
4CVE-2025-32462 Exploithttps://github.com/cybersentinelx1/CVE-2025-32462-ExploitPOC Details
5CVE-2025-32462 exploit codehttps://github.com/mylovem313/CVE-2025-32462POC Details
6🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoershttps://github.com/cyberpoul/CVE-2025-32462-POCPOC Details
7cve-2025-32462' demohttps://github.com/SpongeBob-369/cve-2025-32462POC Details
8Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research.https://github.com/MAAYTHM/CVE-2025-32462_32463-LabPOC Details
9Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distroshttps://github.com/toohau/CVE-2025-32462-32463-Detection-Script-POC Details
10The vulnerability was found by Rich Mirch. More details on it here: https://cxsecurity.com/issue/WLB-2025070022https://github.com/j3r1ch0123/CVE-2025-32462POC Details
11CVE-2025-32462 & CVE-2025-32463https://github.com/harsh1verma/CVE-AnalysisPOC Details
12CVE-2025-32462 is a local privilege escalation vulnerability in sudohttps://github.com/OffSecPlaybook/CVE-2025-32462-POC Details
13POC for the CVE-2025-32462 and CVE-2025-32463 vulnerabilitieshttps://github.com/lakshan-sameera/CVE-2025-32462-and-CVE-2025-32463---Critical-Sudo-VulnerabilitiesPOC Details
14🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoershttps://github.com/0p5cur/CVE-2025-32462-POCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-32462
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-32462
Anonymous User
2026-01-15 06:09:51

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment