7.0
HIGH CVSS 3.1
CVE-2025-6019
Libblockdev: lpe from allow_active to root in libblockdev via udisks
Description

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

INFO

Published Date :

June 19, 2025, 12:15 p.m.

Last Modified :

July 10, 2025, 2:15 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2025-6019 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Redhat enterprise_linux
1 Gnu grub2
1 Libssh libssh
1 Unicode international_components_for_unicode
1 Gitoxidelabs gix-date
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
Solution
Update libblockdev and related packages to patch the privilege escalation vulnerability.
  • Update libblockdev to the latest version.
  • Apply system patches for udisks.
  • Review Polkit configurations for 'allow_active' settings.
  • Avoid mounting untrusted filesystem images.
Public PoC/Exploit Available at Github

CVE-2025-6019 has a 34 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-6019 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-6019 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Privilege escalation exploit chain (CVE-2025-6018 + CVE-2025-6019) for openSUSE Leap 15.6

Shell

Updated: 4 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 14, 2026, 6 p.m. This repo has been linked 2 different CVEs too.

CVE-2025-6019: udisks2 XFS Resize TOCTOU Privilege Escalation

Python Shell

Updated: 2 days, 14 hours ago
1 stars 0 fork 0 watcher
Born at : Feb. 13, 2026, 10:26 p.m. This repo has been linked 1 different CVEs too.

None

Shell

Updated: 4 days, 22 hours ago
0 stars 0 fork 0 watcher
Born at : Feb. 13, 2026, 7:23 p.m. This repo has been linked 1 different CVEs too.

Vulnerability chaining leads to privilege escalation

Updated: 4 days ago
1 stars 0 fork 0 watcher
Born at : Feb. 13, 2026, 2:09 p.m. This repo has been linked 2 different CVEs too.

CVE-2025-6018 CVE-2025-6019 PoC Exploit - Local Privilege Escalation in openSUSE/SUSE Linux Enterprise 15 - PAM bypass + udisks2 XFS race condition LPE to root

cve-2025-6018 cve-2025-6019 hacking linux-shell opensuse pam pentest pentesting poc privilege-escalation reverse-shell security suse udisks2

Shell

Updated: 4 days, 8 hours ago
1 stars 0 fork 0 watcher
Born at : Feb. 12, 2026, 8:40 p.m. This repo has been linked 2 different CVEs too.

None

Shell

Updated: 6 days, 3 hours ago
0 stars 0 fork 0 watcher
Born at : Feb. 12, 2026, 2:36 p.m. This repo has been linked 1 different CVEs too.

CVE-2025-6018 (pam LPE unpriv->allow_active), CVE-2025-6019 (udisks LPE allow_active->root) in sh

Shell

Updated: 1 week ago
0 stars 0 fork 0 watcher
Born at : Feb. 11, 2026, 12:51 a.m. This repo has been linked 2 different CVEs too.

Auto exploit for CVE-2025-6018 & CVE-2025-6019 based on https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019

Python Shell

Updated: 1 day, 14 hours ago
1 stars 0 fork 0 watcher
Born at : Feb. 10, 2026, 8:30 p.m. This repo has been linked 2 different CVEs too.

Script-only privilege escalation chain using CVE-2025-6019 and UDisks2 (no filesystem image included).

htb-scripts htb-writeups cve-2025-6019

Shell

Updated: 1 week, 1 day ago
0 stars 0 fork 0 watcher
Born at : Feb. 10, 2026, 9:29 a.m. This repo has been linked 2 different CVEs too.

A Proof of Concept for chaining CVE-2025-6018 (PAM/Polkit Active Session Bypass) and CVE-2025-6019 (libblockdev SUID Mount Flaw) to achieve Local Privilege Escalation (LPE) on vulnerable Linux systems.

Shell

Updated: 5 days, 20 hours ago
3 stars 0 fork 0 watcher
Born at : Feb. 9, 2026, 7:17 p.m. This repo has been linked 2 different CVEs too.

Exploit Chain of CVE-2025-6018 to CVE-2025-6019

Shell

Updated: 6 days, 23 hours ago
1 stars 1 fork 1 watcher
Born at : Feb. 9, 2026, 1:44 p.m. This repo has been linked 2 different CVEs too.

CVE-2025-6018 + CVE-2025-6019 Privilege Escalation Exploit

Shell

Updated: 1 week ago
6 stars 0 fork 0 watcher
Born at : Feb. 9, 2026, 8:01 a.m. This repo has been linked 2 different CVEs too.

None

Shell

Updated: 1 week, 2 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 9, 2026, 7:10 a.m. This repo has been linked 1 different CVEs too.

This is just a quick note on how to exploit these vulnerabilities to get root.

Updated: 1 week, 1 day ago
1 stars 0 fork 0 watcher
Born at : Feb. 9, 2026, 4:41 a.m. This repo has been linked 2 different CVEs too.

Mirror of https://github.com/nomi-sec/PoC-in-GitHub

Updated: 1 week, 2 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 7, 2026, 10:02 a.m. This repo has been linked 789 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-6019 vulnerability anywhere in the article.

  • Daily CyberSecurity
Wide Open Firewall: Critical Foomuuri Flaws Let Local Users Take Control

The SUSE Security Team has released a detailed report exposing multiple vulnerabilities in Foomuuri, a popular nftables-based firewall manager for Linux, that left the firewall’s management interface ... Read more

Published Date: Jan 09, 2026 (1 month, 1 week ago)
  • Kaspersky
Update Microsoft SharePoint ASAP | Kaspersky official blog

Unknown malefactors are actively attacking companies that use SharePoint Server 2016, SharePoint Server 2019 and SharePoint Server Subscription Edition. By exploiting a chain of two vulnerabilities – ... Read more

Published Date: Jul 21, 2025 (6 months, 4 weeks ago)
  • Cyber Security News
PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev

A proof-of-concept exploit for a critical local privilege escalation vulnerability affecting major Linux distributions, including Fedora and SUSE environments. The vulnerability, designated CVE-2025-6 ... Read more

Published Date: Jul 07, 2025 (7 months, 1 week ago)
  • Daily CyberSecurity
Linux Privilege Escalation (CVE-2025-6019): Root Access Via udisksd & libblockdev, PoC Available

Security researchers from SecureLayer7 published the technical details and a proof-of-concept exploit for a security vulnerability, CVE-2025-6019, affecting Linux distributions that rely on the udisks ... Read more

Published Date: Jul 07, 2025 (7 months, 1 week ago)
  • Kaspersky
Multiple vulnerabilities in Sitecore CMS | Kaspersky official blog

Researchers have uncovered three vulnerabilities in the popular content management system, Sitecore Experience Platform. CVE-2025-34509 involves a hard-coded password (consisting of just a single lett ... Read more

Published Date: Jun 24, 2025 (7 months, 3 weeks ago)

The following table lists the changes that have been made to the CVE-2025-6019 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    Jul. 10, 2025

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2025:10796
  • CVE Modified by [email protected]

    Jun. 30, 2025

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2025:9878
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Jun. 23, 2025

    Action Type Old Value New Value
    Added Reference https://news.ycombinator.com/item?id=44325861
    Added Reference https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/
  • CVE Modified by [email protected]

    Jun. 23, 2025

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2025:9320
    Added Reference https://access.redhat.com/errata/RHSA-2025:9321
    Added Reference https://access.redhat.com/errata/RHSA-2025:9322
    Added Reference https://access.redhat.com/errata/RHSA-2025:9323
    Added Reference https://access.redhat.com/errata/RHSA-2025:9324
    Added Reference https://access.redhat.com/errata/RHSA-2025:9325
    Added Reference https://access.redhat.com/errata/RHSA-2025:9326
    Added Reference https://access.redhat.com/errata/RHSA-2025:9327
    Added Reference https://access.redhat.com/errata/RHSA-2025:9328
  • CVE Modified by [email protected]

    Jun. 21, 2025

    Action Type Old Value New Value
    Added Reference https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Jun. 19, 2025

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2025/06/17/5
    Added Reference http://www.openwall.com/lists/oss-security/2025/06/17/6
    Added Reference http://www.openwall.com/lists/oss-security/2025/06/18/1
    Added Reference https://lists.debian.org/debian-lts-announce/2025/06/msg00018.html
  • New CVE Received by [email protected]

    Jun. 19, 2025

    Action Type Old Value New Value
    Added Description A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
    Added CVSS V3.1 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-250
    Added Reference https://access.redhat.com/security/cve/CVE-2025-6019
    Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=2370051
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact