Overview
Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.
This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://www.sudo.ws/security/advisories/chroot_bug/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-32463
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2025-32463 |
| Vendor / Product | Sudo — Sudo |
| NVD Published | 2025-06-30 |
| NVD Last Modified | 2025-11-05 |
| CVSS 3.1 Score | 9.3 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-829 |
| CISA KEV Added | 2025-09-29 |
| CISA KEV Deadline | 2025-10-20 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2025-10-20.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2025-09-29 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2025-10-20 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2025-32463 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |