Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.4

Red Hat Process Automation Manager container allows non-root users to gain root access

CVE-2025-58713
Summary

Non-root users in certain Red Hat Process Automation Manager containers can gain full root access, allowing them to perform any action within the container. This happens when a user in the root group can modify the /etc/passwd file. To fix this, ensure that group-writable permissions are removed from the /etc/passwd file during container build time.

Original title
A container privilege escalation flaw was found in certain Red Hat Process Automation Manager images. This issue stems from the /etc/passwd file being created with group-writable permissions during...
Original description
A container privilege escalation flaw was found in certain Red Hat Process Automation Manager images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
nvd CVSS3.1 6.4
Vulnerability type
CWE-276 Incorrect Default Permissions
Published: 8 Apr 2026 · Updated: 8 Apr 2026 · First seen: 8 Apr 2026