First published: Mon May 12 2025(Updated: )
sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with limited sudo privileges (e.g. execution of a single command) can list sudo privileges of other users using the `-U` flag. This vulnerability allows users with limited sudo privileges to enumerate the sudoers file, revealing sensitive information about other users' permissions. Attackers can collect information that can be used to more targeted attacks. Systems where users either do not have sudo privileges or have the ability to run all commands as root through sudo (the default configuration on most systems) are not affected by this advisory. Version 0.2.6 fixes the vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
sudo-rs | <0.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46718 is considered to have moderate severity due to its potential to expose user privilege information.
To fix CVE-2025-46718, upgrade to version 0.2.6 or later of the sudo-rs software.
Users with limited sudo privileges on versions prior to 0.2.6 of sudo-rs are affected by CVE-2025-46718.
CVE-2025-46718 allows users with limited sudo privileges to list the sudo privileges of other users using the -U flag.
CVE-2025-46718 was disclosed prior to the release of version 0.2.6 of sudo-rs.