CVE-2025-32463 - sudo Local Privilege Escalation (PoC)
⚠️ This repository contains a Proof of Concept (PoC) exploit for CVE-2025-32463
Intended only for educational purposes and use in authorized environments.
🧠 About the Vulnerability
CVE-2025-32463 is a local privilege escalation vulnerability affecting sudo versions 1.9.14 to 1.9.17.
The flaw resides in the way sudo handles the --chroot (-R) option introduced in 1.9.14. It allows an unprivileged user to craft a fake nsswitch.conf inside a controlled chroot path, forcing sudo (running as root) to load an arbitrary NSS library and execute code as root.
✅ Affected Versions
sudo≥ 1.9.14 and < 1.9.17p1- Unaffected:
- Versions < 1.9.14 (feature not present)
- Versions ≥ 1.9.17p1 (vulnerability patched)
🚩 Requirements
- A vulnerable version of
sudo(see above) gccinstalled- The user can run
sudo -Rwith an arbitrary directory (some setups restrict this)
🚀 Exploit Steps
- Clone this repository or just download the script
- Run the PoC script:
chmod +x CVE-2025-32463.sh && ./CVE-2025-32463.sh
📚 References
Languages
Shell
100%