Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-6018
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Pam-config: lpe from unprivileged to allow_active in pam
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不正确
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux-pam 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux-pam是Linux团队的一款用于Linux的支持插拔式的系统身份验证软件。 Linux-pam存在安全漏洞,该漏洞源于权限管理不当,可能导致本地权限提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
II. Public POCs for CVE-2025-6018
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/iamgithubber/CVE-2025-6018-19-exploitPOC Details
2Exploit for CVE-2025-6019https://github.com/dreysanox/CVE-2025-6018_PocPOC Details
3CVE-2025-6018 Poc and Exploit https://github.com/ibrahmsql/CVE-2025-6018POC Details
4CVE-2025-6018https://github.com/B1ack4sh/Blackash-CVE-2025-6018POC Details
5CVE-2025-6018https://github.com/Ashwesker/Blackash-CVE-2025-6018POC Details
6Nonehttps://github.com/euxem/Analyse-faille-de-s-curit-CVE-2025-6018-CVE-2025-6019POC Details
7CVE-2025-6018https://github.com/Ashwesker/Ashwesker-CVE-2025-6018POC Details
8This is just a quick note on how to exploit these vulnerabilities to get root.https://github.com/AzureADTrent/CVE-2025-6018-and-CVE-2025-6019-Privilege-EscalationPOC Details
9CVE-2025-6018 + CVE-2025-6019 Privilege Escalation Exploithttps://github.com/muyuanlove/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-ExploitPOC Details
10Exploit Chain of CVE-2025-6018 to CVE-2025-6019https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019POC Details
11A Proof of Concept for chaining CVE-2025-6018 (PAM/Polkit Active Session Bypass) and CVE-2025-6019 (libblockdev SUID Mount Flaw) to achieve Local Privilege Escalation (LPE) on vulnerable Linux systems.https://github.com/MichaelVenturella/CVE-2025-6018-6019-PoCPOC Details
12Auto exploit for CVE-2025-6018 & CVE-2025-6019 based on https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019https://github.com/Goultarde/CVE-2025-6018_CVE-2025-6019_autopwnPOC Details
13CVE-2025-6018 (pam LPE unpriv->allow_active), CVE-2025-6019 (udisks LPE allow_active->root) in shhttps://github.com/matesz44/CVE-2025-6018-19POC Details
14CVE-2025-6018 CVE-2025-6019 PoC Exploit - Local Privilege Escalation in openSUSE/SUSE Linux Enterprise 15 - PAM bypass + udisks2 XFS race condition LPE to roothttps://github.com/DesertDemons/CVE-2025-6018-6019POC Details
15Vulnerability chaining leads to privilege escalationhttps://github.com/localh0ste/CVE-2025-6018-and-CVE-2025-6019POC Details
16Privilege escalation exploit chain (CVE-2025-6018 + CVE-2025-6019) for openSUSE Leap 15.6https://github.com/MaxKappa/opensuse-leap-privesc-exploitPOC Details
17Nonehttps://github.com/iOxsec/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-ExploitPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-6018
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-6018
Anonymous User
2026-01-15 06:08:48

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment