icon

We found results for “

CVE-2025-32955

Good to know:

icon

Date: April 21, 2025

Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Versions from 0.12.0 to before 2.12.0 are vulnerable to "disable-sudo" bypass. Harden-Runner includes a policy option "disable-sudo" to prevent the GitHub Actions runner user from using sudo. This is implemented by removing the runner user from the sudoers file. However, this control can be bypassed as the runner user, being part of the docker group, can interact with the Docker daemon to launch privileged containers or access the host filesystem. This allows the attacker to regain root access or restore the sudoers file, effectively bypassing the restriction. This issue has been patched in version 2.12.0.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Privilege Management

CWE-269

Execution with Unnecessary Privileges

CWE-250

Privilege Chaining

CWE-268

Least Privilege Violation

CWE-272

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/step-security/harden-runner.git - v2;https://github.com/step-security/harden-runner.git - v2.12.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us