Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-32463
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
从非可信控制范围包含功能例程
Source: NVD (National Vulnerability Database)
Vulnerability Title
Sudo 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Sudo projectSudo 1.9.14 ~ 1.9.17p1 -
II. Public POCs for CVE-2025-32463
#POC DescriptionSource LinkShenlong Link
1Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463https://github.com/pr0v3rbs/CVE-2025-32463_chwootPOC Details
2Nonehttps://github.com/4f-kira/CVE-2025-32463POC Details
3CVE-2025-32463 Proof of concepthttps://github.com/K1tt3h/CVE-2025-32463-POCPOC Details
4Nonehttps://github.com/Adonijah01/cve-2025-32463-labPOC Details
5Nonehttps://github.com/SysMancer/CVE-2025-32463POC Details
6Local Privilege Escalation to Root via Sudo chroot in Linuxhttps://github.com/kh4sh3i/CVE-2025-32463POC Details
7Nonehttps://github.com/neko205-mx/CVE-2025-32463_ExploitPOC Details
8Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463) https://github.com/pevinkumar10/CVE-2025-32463POC Details
9Nonehttps://github.com/zhaduchanhzz/CVE-2025-32463_POCPOC Details
10Nonehttps://github.com/robbert1978/CVE-2025-32463_POCPOC Details
11Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell)https://github.com/Mikivirus0/sudoinjectionPOC Details
12Sudo chroot privileged escalation PoChttps://github.com/nflatrea/CVE-2025-32463POC Details
13Nonehttps://github.com/san8383/CVE-2025-32463POC Details
14Nonehttps://github.com/0xAkarii/CVE-2025-32463POC Details
15Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL.https://github.com/CIA911/sudo_patch_CVE-2025-32463POC Details
16PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerabilityhttps://github.com/mirchr/CVE-2025-32463-sudo-chwootPOC Details
17Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled chroot environment.https://github.com/ill-deed/CVE-2025-32463_illdeedPOC Details
18# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .sohttps://github.com/zinzloun/CVE-2025-32463POC Details
19Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒https://github.com/yeremeu/CVE-2025-32463_chwootPOC Details
20🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only.https://github.com/cyberpoul/CVE-2025-32463-POCPOC Details
21CVE-2025-32463https://github.com/B1ack4sh/Blackash-CVE-2025-32463POC Details
22Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨https://github.com/SkylerMC/CVE-2025-32463POC Details
23Linux distributions: Affects Ubuntu, Debian, Fedora, CentOS, SUSE, Amazon Linux, and others shipping sudo v1.9.14–1.9.17https://github.com/junxian428/CVE-2025-32463POC Details
24Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.https://github.com/FreeDurok/CVE-2025-32463-PoCPOC Details
25Nonehttps://github.com/Chocapikk/CVE-2025-32463-labPOC Details
26A PoC exploit for CVE-2025-32463 - Sudo Privilege Escalationhttps://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOITPOC Details
27# cve-2025-32463 - Local Privilege Escalation to Root via Sudo chroot in Linuxhttps://github.com/SpongeBob-369/cve-2025-32463POC Details
28Nonehttps://github.com/lowercasenumbers/CVE-2025-32463_sudo_chrootPOC Details
29PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments.https://github.com/abrewer251/CVE-2025-32463_Sudo_PoCPOC Details
30Nonehttps://github.com/0xb0rn3/CVE-2025-32463-EXPLOITPOC Details
31Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc)https://github.com/morgenm/sudo-chroot-CVE-2025-32463POC Details
32Privilege escalation to root using sudo chroot, NO NEED for gcc installed.https://github.com/MohamedKarrab/CVE-2025-32463POC Details
33Educational Docker lab to simulate privilege escalation via CVE-2025-32463https://github.com/dbarquero/cve-2025-32463-labPOC Details
34CVE-2025-32463 漏洞概念验证https://github.com/9Insomnie/CVE-2025-32463POC Details
35Nonehttps://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POCPOC Details
36Nonehttps://github.com/Floodnut/CVE-2025-32463POC Details
37Privilege escalation to root via sudo without gcc. Exploit works on vulnerable sudo versions. Clone the repo and run the script. 🐙💻https://github.com/92gmuz/CVE-2025-32463POC Details
38This is the exploit for the CVE-2025-32463https://github.com/Rajneeshkarya/CVE-2025-32463POC Details
39Local Privilege Escalation to Root via Sudo chroot in Linux https://github.com/MGunturG/CVE-2025-32463POC Details
40End-to-end simulation of a Python dependency confusion attack, sudo privilege escalation (CVE-2025-32463), and rootkit-based persistence - with full memory and network forensic analysis.https://github.com/IC3-512/linux-root-kitPOC Details
41Nonehttps://github.com/daryllundy/CVE-2025-32463POC Details
42A deep dive into two critical Sudo vulnerabilities (CVE‑2025‑32463 & CVE‑2025‑32462) that enable local privilege escalation across major Linux distributions.https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462POC Details
43CVE-2025-32463https://github.com/ChetanKomal/sudo_exploitPOC Details
44CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploithttps://github.com/KaiHT-Ladiant/CVE-2025-32463POC Details
45本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。https://github.com/y4ney/CVE-2025-32463-labPOC Details
46Questo script è un proof of concept (PoC) che dimostra una tecnica di privilege escalation (Elevazione di privilegi) sfruttando una vulnerabilità teorica di sudo (es. CVE-2025-32463). Il PoC forza sudo a caricare una libreria .so manipolata sfruttando la funzionalità -R (chroot) e la configurazione personalizzata di NSS (nsswitch.conf).https://github.com/aldoClau98/CVE-2025-32463POC Details
47Nonehttps://github.com/painoob/CVE-2025-32463POC Details
48This CVE addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access.https://github.com/Nowafen/CVE-2025-32463POC Details
49POC for CVE-2025-32463 sudo_chwoothttps://github.com/Yuy0ung/CVE-2025-32463_chwootPOC Details
50Nonehttps://github.com/hacieda/CVE-2025-32463POC Details
51Nonehttps://github.com/blackcat4347/CVE-2025-32463_PoCPOC Details
52🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.https://github.com/ashardev002/CVE-2025-32463_chwootPOC Details
53Nonehttps://github.com/mihnasdsad/CVE-2025-32463POC Details
54Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.https://github.com/At0mXploit/CVE-2025-32463POC Details
55🔒 Elevate privileges to root via sudo without requiring gcc on the target system. Simplify exploit execution with pre-compiled payloads.https://github.com/no-speech-to-text/CVE-2025-32463POC Details
56🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis.https://github.com/DaadaAyoze/CVE-2025-32463-labPOC Details
57This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation.https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-EscapePOC Details
58Nonehttps://github.com/7r00t/cve-2025-32463-labPOC Details
59A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --chroot option, which incorrectly uses /etc/nsswitch.conf from a user-controlled directory.https://github.com/AC8999/CVE-2025-32463POC Details
60Nonehttps://github.com/onniio/CVE-2025-32463POC Details
61# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .sohttps://github.com/khoazero123/CVE-2025-32463POC Details
62This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)https://github.com/r3dBust3r/CVE-2025-32463POC Details
63sudo --chroot exploithttps://github.com/0x3c4dfa1/CVE-2025-32463POC Details
64Enviroment and Nuclei template to test CVE-2025-32463https://github.com/ricardomaia/CVE-2025-32463POC Details
65- Vulnerable: sudo 1.9.14, 1.9.15, 1.9.16, 1.9.17 - Patched in: sudo 1.9.17p1 and later - Legacy versions older than 1.9.14 are not affected, as they don't support the --chroot option.https://github.com/shazed-x/CVE-2025-32463POC Details
66Nonehttps://github.com/cybershaolin47/CVE-2025-32463_POCPOC Details
67Privilege escalation to root using sudo chroot, NO NEED for gcc installed.https://github.com/cyberajju/CVE-2025-32463POC Details
68Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Pythonhttps://github.com/dr4x-c0d3r/sudo-chrootPOC Details
69Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Pythonhttps://github.com/dr4xp/sudo-chrootPOC Details
70Nonehttps://github.com/robbin0919/CVE-2025-32463POC Details
71CVE‑2025‑32463https://github.com/DensuLabs/CVE-2025-32463POC Details
72This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation.https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-EscapePOC Details
73Technical examination of CVE-2025-32463 by Muhammed Kaya. https://github.com/muhammedkayag/CVE-2025-32463POC Details
74exploithttps://github.com/NewComrade12211/CVE-2025-32463POC Details
75Nonehttps://github.com/Ghstxz/CVE-2025-32463POC Details
76Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps.https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-EscalationPOC Details
77Chroot Privilege Escalationhttps://github.com/justjoeyking/CVE-2025-32463POC Details
78CVE-2025-32463https://github.com/Ashwesker/Blackash-CVE-2025-32463POC Details
79Privilege escalation to root using sudo chroot, NO NEED for gcc installed.https://github.com/cybertechajju/CVE-2025-32463POC Details
80Nonehttps://github.com/Mr-Alperen/CVE-2025-32463POC Details
81CVE-2025-32463https://github.com/Ashwesker/Ashwesker-CVE-2025-32463POC Details
82Nonehttps://github.com/aexdyhaxor/CVE-2025-32463POC Details
83Proof of Concept (PoC) Escalada de privilegios por versión de Sudo.https://github.com/wvverez/CVE-2025-32463POC Details
84🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only.https://github.com/0p5cur/CVE-2025-32463-POCPOC Details
85CVE-2025-32463https://github.com/gmh5225/Blackash-CVE-2025-32463POC Details
86CVE-2025-32463https://github.com/SpycioKon/CVE-2025-32463POC Details
87C reimplementation of chwoot PoChttps://github.com/vpr-labs/CVE-2025-32463POC Details
88Nonehttps://github.com/danilo1992-sys/CVE-2025-32463POC Details
89Sudo before 1.9.17p1 allows local users to obtain root access by using /etc/nsswitch.conf from a user-controlled directory with the --chroot (-R) option. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-32463.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-32463
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-32463
Anonymous User
2026-01-15 06:08:53

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment