Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Sudo project | Sudo | 1.9.14 ~ 1.9.17p1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463 | https://github.com/pr0v3rbs/CVE-2025-32463_chwoot | POC Details |
| 2 | None | https://github.com/4f-kira/CVE-2025-32463 | POC Details |
| 3 | CVE-2025-32463 Proof of concept | https://github.com/K1tt3h/CVE-2025-32463-POC | POC Details |
| 4 | None | https://github.com/Adonijah01/cve-2025-32463-lab | POC Details |
| 5 | None | https://github.com/SysMancer/CVE-2025-32463 | POC Details |
| 6 | Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/kh4sh3i/CVE-2025-32463 | POC Details |
| 7 | None | https://github.com/neko205-mx/CVE-2025-32463_Exploit | POC Details |
| 8 | Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463) | https://github.com/pevinkumar10/CVE-2025-32463 | POC Details |
| 9 | None | https://github.com/zhaduchanhzz/CVE-2025-32463_POC | POC Details |
| 10 | None | https://github.com/robbert1978/CVE-2025-32463_POC | POC Details |
| 11 | Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell) | https://github.com/Mikivirus0/sudoinjection | POC Details |
| 12 | Sudo chroot privileged escalation PoC | https://github.com/nflatrea/CVE-2025-32463 | POC Details |
| 13 | None | https://github.com/san8383/CVE-2025-32463 | POC Details |
| 14 | None | https://github.com/0xAkarii/CVE-2025-32463 | POC Details |
| 15 | Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL. | https://github.com/CIA911/sudo_patch_CVE-2025-32463 | POC Details |
| 16 | PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability | https://github.com/mirchr/CVE-2025-32463-sudo-chwoot | POC Details |
| 17 | Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled chroot environment. | https://github.com/ill-deed/CVE-2025-32463_illdeed | POC Details |
| 18 | # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so | https://github.com/zinzloun/CVE-2025-32463 | POC Details |
| 19 | Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒 | https://github.com/yeremeu/CVE-2025-32463_chwoot | POC Details |
| 20 | 🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only. | https://github.com/cyberpoul/CVE-2025-32463-POC | POC Details |
| 21 | CVE-2025-32463 | https://github.com/B1ack4sh/Blackash-CVE-2025-32463 | POC Details |
| 22 | Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨ | https://github.com/SkylerMC/CVE-2025-32463 | POC Details |
| 23 | Linux distributions: Affects Ubuntu, Debian, Fedora, CentOS, SUSE, Amazon Linux, and others shipping sudo v1.9.14–1.9.17 | https://github.com/junxian428/CVE-2025-32463 | POC Details |
| 24 | Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only. | https://github.com/FreeDurok/CVE-2025-32463-PoC | POC Details |
| 25 | None | https://github.com/Chocapikk/CVE-2025-32463-lab | POC Details |
| 26 | A PoC exploit for CVE-2025-32463 - Sudo Privilege Escalation | https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT | POC Details |
| 27 | # cve-2025-32463 - Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/SpongeBob-369/cve-2025-32463 | POC Details |
| 28 | None | https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot | POC Details |
| 29 | PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments. | https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC | POC Details |
| 30 | None | https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT | POC Details |
| 31 | Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc) | https://github.com/morgenm/sudo-chroot-CVE-2025-32463 | POC Details |
| 32 | Privilege escalation to root using sudo chroot, NO NEED for gcc installed. | https://github.com/MohamedKarrab/CVE-2025-32463 | POC Details |
| 33 | Educational Docker lab to simulate privilege escalation via CVE-2025-32463 | https://github.com/dbarquero/cve-2025-32463-lab | POC Details |
| 34 | CVE-2025-32463 漏洞概念验证 | https://github.com/9Insomnie/CVE-2025-32463 | POC Details |
| 35 | None | https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC | POC Details |
| 36 | None | https://github.com/Floodnut/CVE-2025-32463 | POC Details |
| 37 | Privilege escalation to root via sudo without gcc. Exploit works on vulnerable sudo versions. Clone the repo and run the script. 🐙💻 | https://github.com/92gmuz/CVE-2025-32463 | POC Details |
| 38 | This is the exploit for the CVE-2025-32463 | https://github.com/Rajneeshkarya/CVE-2025-32463 | POC Details |
| 39 | Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/MGunturG/CVE-2025-32463 | POC Details |
| 40 | End-to-end simulation of a Python dependency confusion attack, sudo privilege escalation (CVE-2025-32463), and rootkit-based persistence - with full memory and network forensic analysis. | https://github.com/IC3-512/linux-root-kit | POC Details |
| 41 | None | https://github.com/daryllundy/CVE-2025-32463 | POC Details |
| 42 | A deep dive into two critical Sudo vulnerabilities (CVE‑2025‑32463 & CVE‑2025‑32462) that enable local privilege escalation across major Linux distributions. | https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462 | POC Details |
| 43 | CVE-2025-32463 | https://github.com/ChetanKomal/sudo_exploit | POC Details |
| 44 | CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit | https://github.com/KaiHT-Ladiant/CVE-2025-32463 | POC Details |
| 45 | 本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。 | https://github.com/y4ney/CVE-2025-32463-lab | POC Details |
| 46 | Questo script è un proof of concept (PoC) che dimostra una tecnica di privilege escalation (Elevazione di privilegi) sfruttando una vulnerabilità teorica di sudo (es. CVE-2025-32463). Il PoC forza sudo a caricare una libreria .so manipolata sfruttando la funzionalità -R (chroot) e la configurazione personalizzata di NSS (nsswitch.conf). | https://github.com/aldoClau98/CVE-2025-32463 | POC Details |
| 47 | None | https://github.com/painoob/CVE-2025-32463 | POC Details |
| 48 | This CVE addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access. | https://github.com/Nowafen/CVE-2025-32463 | POC Details |
| 49 | POC for CVE-2025-32463 sudo_chwoot | https://github.com/Yuy0ung/CVE-2025-32463_chwoot | POC Details |
| 50 | None | https://github.com/hacieda/CVE-2025-32463 | POC Details |
| 51 | None | https://github.com/blackcat4347/CVE-2025-32463_PoC | POC Details |
| 52 | 🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment. | https://github.com/ashardev002/CVE-2025-32463_chwoot | POC Details |
| 53 | None | https://github.com/mihnasdsad/CVE-2025-32463 | POC Details |
| 54 | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. | https://github.com/At0mXploit/CVE-2025-32463 | POC Details |
| 55 | 🔒 Elevate privileges to root via sudo without requiring gcc on the target system. Simplify exploit execution with pre-compiled payloads. | https://github.com/no-speech-to-text/CVE-2025-32463 | POC Details |
| 56 | 🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis. | https://github.com/DaadaAyoze/CVE-2025-32463-lab | POC Details |
| 57 | This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation. | https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-Escape | POC Details |
| 58 | None | https://github.com/7r00t/cve-2025-32463-lab | POC Details |
| 59 | A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --chroot option, which incorrectly uses /etc/nsswitch.conf from a user-controlled directory. | https://github.com/AC8999/CVE-2025-32463 | POC Details |
| 60 | None | https://github.com/onniio/CVE-2025-32463 | POC Details |
| 61 | # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so | https://github.com/khoazero123/CVE-2025-32463 | POC Details |
| 62 | This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17) | https://github.com/r3dBust3r/CVE-2025-32463 | POC Details |
| 63 | sudo --chroot exploit | https://github.com/0x3c4dfa1/CVE-2025-32463 | POC Details |
| 64 | Enviroment and Nuclei template to test CVE-2025-32463 | https://github.com/ricardomaia/CVE-2025-32463 | POC Details |
| 65 | - Vulnerable: sudo 1.9.14, 1.9.15, 1.9.16, 1.9.17 - Patched in: sudo 1.9.17p1 and later - Legacy versions older than 1.9.14 are not affected, as they don't support the --chroot option. | https://github.com/shazed-x/CVE-2025-32463 | POC Details |
| 66 | None | https://github.com/cybershaolin47/CVE-2025-32463_POC | POC Details |
| 67 | Privilege escalation to root using sudo chroot, NO NEED for gcc installed. | https://github.com/cyberajju/CVE-2025-32463 | POC Details |
| 68 | Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python | https://github.com/dr4x-c0d3r/sudo-chroot | POC Details |
| 69 | Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python | https://github.com/dr4xp/sudo-chroot | POC Details |
| 70 | None | https://github.com/robbin0919/CVE-2025-32463 | POC Details |
| 71 | CVE‑2025‑32463 | https://github.com/DensuLabs/CVE-2025-32463 | POC Details |
| 72 | This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation. | https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-Escape | POC Details |
| 73 | Technical examination of CVE-2025-32463 by Muhammed Kaya. | https://github.com/muhammedkayag/CVE-2025-32463 | POC Details |
| 74 | exploit | https://github.com/NewComrade12211/CVE-2025-32463 | POC Details |
| 75 | None | https://github.com/Ghstxz/CVE-2025-32463 | POC Details |
| 76 | Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps. | https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation | POC Details |
| 77 | Chroot Privilege Escalation | https://github.com/justjoeyking/CVE-2025-32463 | POC Details |
| 78 | CVE-2025-32463 | https://github.com/Ashwesker/Blackash-CVE-2025-32463 | POC Details |
| 79 | Privilege escalation to root using sudo chroot, NO NEED for gcc installed. | https://github.com/cybertechajju/CVE-2025-32463 | POC Details |
| 80 | None | https://github.com/Mr-Alperen/CVE-2025-32463 | POC Details |
| 81 | CVE-2025-32463 | https://github.com/Ashwesker/Ashwesker-CVE-2025-32463 | POC Details |
| 82 | None | https://github.com/aexdyhaxor/CVE-2025-32463 | POC Details |
| 83 | Proof of Concept (PoC) Escalada de privilegios por versión de Sudo. | https://github.com/wvverez/CVE-2025-32463 | POC Details |
| 84 | 🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only. | https://github.com/0p5cur/CVE-2025-32463-POC | POC Details |
| 85 | CVE-2025-32463 | https://github.com/gmh5225/Blackash-CVE-2025-32463 | POC Details |
| 86 | CVE-2025-32463 | https://github.com/SpycioKon/CVE-2025-32463 | POC Details |
| 87 | C reimplementation of chwoot PoC | https://github.com/vpr-labs/CVE-2025-32463 | POC Details |
| 88 | None | https://github.com/danilo1992-sys/CVE-2025-32463 | POC Details |
| 89 | Sudo before 1.9.17p1 allows local users to obtain root access by using /etc/nsswitch.conf from a user-controlled directory with the --chroot (-R) option. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-32463.yaml | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.