Search for vulnerabilities
Vulnerability details: VCID-yswe-3wmd-h3hx
Vulnerability ID VCID-yswe-3wmd-h3hx
Aliases CVE-2025-4802
Summary Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
Status Published
Exploitability 0.5
Weighted Severity 7.6
Risk 3.8
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.0 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json
cvssv3 8.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00013 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 6e-05 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2025-4802
cvssv3.1 8.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.8 https://sourceware.org/bugzilla/show_bug.cgi?id=32976
cvssv3.1 9.8 https://sourceware.org/bugzilla/show_bug.cgi?id=32976
ssvc Track https://sourceware.org/bugzilla/show_bug.cgi?id=32976
ssvc Track https://sourceware.org/bugzilla/show_bug.cgi?id=32976
cvssv3.1 7.8 https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
cvssv3.1 9.8 https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
ssvc Track https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
ssvc Track https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://sourceware.org/bugzilla/show_bug.cgi?id=32976
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://sourceware.org/bugzilla/show_bug.cgi?id=32976
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-17T02:32:04Z/ Found at https://sourceware.org/bugzilla/show_bug.cgi?id=32976

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/ Found at https://sourceware.org/bugzilla/show_bug.cgi?id=32976
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/ Found at https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e

Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-17T02:32:04Z/ Found at https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
Exploit Prediction Scoring System (EPSS)
Percentile 0.0114
EPSS Score 0.00012
Published At May 21, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-05-18T13:26:12.143480+00:00 Debian Importer Import https://security-tracker.debian.org/tracker/data/json 36.0.0