{"api_version":"1","generated_at":"2026-04-23T02:35:48+00:00","cve":"CVE-2019-25067","urls":{"html":"https://cve.report/CVE-2019-25067","api":"https://cve.report/api/cve/CVE-2019-25067.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-25067","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-25067"},"summary":{"title":"CVE-2019-25067","description":"A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2022-06-09 17:15:00","updated_at":"2022-06-16 14:01:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://vuldb.com/?id.143949","name":"https://vuldb.com/?id.143949","refsource":"MISC","tags":[],"title":"CVE-2019-25067 | Podman/Varlink API Privilege Escalation (EDB-47500 / EDB-47500)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.exploit-db.com/exploits/47500","name":"https://www.exploit-db.com/exploits/47500","refsource":"MISC","tags":[],"title":"Podman & Varlink 1.5.1 - Remote Code Execution - Linux remote Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-25067","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-25067","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"25067","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"podman_project","cpe5":"podman","cpe6":"1.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"25067","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"varlink","cpe5":"varlink","cpe6":"1.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-25067","TITLE":"Podman/Varlink API Privilege Escalation","REQUESTER":"cna@vuldb.com","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"generator":"vuldb.com","affects":{"vendor":{"vendor_data":[{"vendor_name":"","product":{"product_data":[{"product_name":"Podman","version":{"version_data":[{"version_value":"1.5.1"}]}},{"product_name":"Varlink","version":{"version_data":[{"version_value":"1.5.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Privilege Escalation"}]}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."}]},"credit":"Jeremy Brown","impact":{"cvss":{"version":"3.1","baseScore":"6.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}},"references":{"reference_data":[{"url":"https://www.exploit-db.com/exploits/47500","refsource":"MISC","name":"https://www.exploit-db.com/exploits/47500"},{"url":"https://vuldb.com/?id.143949","refsource":"MISC","name":"https://vuldb.com/?id.143949"}]}},"nvd":{"publishedDate":"2022-06-09 17:15:00","lastModifiedDate":"2022-06-16 14:01:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:podman_project:podman:1.5.1:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:varlink:varlink:1.5.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}