Sudo <1.9.17p1 LPE via chroot /etc/nsswitch.conf
CVE-2025-32463 Published on June 30, 2025

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

NVD

Known Exploited Vulnerability

This Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.

The following remediation steps are recommended / required by October 20, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Type

Inclusion of Functionality from Untrusted Control Sphere

The software imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.


Products Associated with CVE-2025-32463

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-32463 are published in these products:

 
 
 
 
 
 
 
 

Affected Versions

Sudo project Sudo:

Exploit Probability

EPSS
25.72%
Percentile
96.14%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.