FreeIPA Privilege Escalation via Missing krbCanonicalName Validation
CVE-2025-7493 Published on September 30, 2025
A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrator's name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
Vulnerability Analysis
CVE-2025-7493 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
Insufficient Granularity of Access Control
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
Products Associated with CVE-2025-7493
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-7493 are published in these products:
Affected Versions
Red Hat Enterprise Linux 10:- Version 0:4.12.2-15.el10_0.4 and below * is unaffected.
- Version 0:4.6.8-5.el7_9.23 and below * is unaffected.
- Version 8100020250919180242.143e9e98 and below * is unaffected.
- Version 8100020250918211722.823393f5 and below * is unaffected.
- Version 8020020250924110056.50ea30f9 and below * is unaffected.
- Version 8020020250924104944.792f4060 and below * is unaffected.
- Version 8040020250923180004.f153676a and below * is unaffected.
- Version 8040020250923175408.5b01ab7e and below * is unaffected.
- Version 8040020250923180004.f153676a and below * is unaffected.
- Version 8040020250923175408.5b01ab7e and below * is unaffected.
- Version 8060020250916172436.c1533a64 and below * is unaffected.
- Version 8060020250916174421.ada582f1 and below * is unaffected.
- Version 8060020250916172436.c1533a64 and below * is unaffected.
- Version 8060020250916174421.ada582f1 and below * is unaffected.
- Version 8060020250916172436.c1533a64 and below * is unaffected.
- Version 8060020250916174421.ada582f1 and below * is unaffected.
- Version 8080020250918184739.e581a9e4 and below * is unaffected.
- Version 8080020250918152850.b0a6ceea and below * is unaffected.
- Version 8080020250918184739.e581a9e4 and below * is unaffected.
- Version 8080020250918152850.b0a6ceea and below * is unaffected.
- Version 0:4.12.2-14.el9_6.5 and below * is unaffected.
- Version 0:4.9.8-11.el9_0.5 and below * is unaffected.
- Version 0:4.10.1-12.el9_2.6 and below * is unaffected.
- Version 0:4.11.0-15.el9_4.7 and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.