Configuration Flaw in Internal Proxy of Red Hat Runtimes Inventory Operator
CVE-2025-11393

8.7HIGH

Key Information:

Vendor

Red Hat

Vendor
CVE Published:
15 December 2025

What is CVE-2025-11393?

A configuration flaw in the Runtimes Inventory Operator for RHEL 8 exposes the internal proxy component to misuse. It improperly associates the cluster's main administrative credentials with any command it processes. As a result, a standard user could potentially execute unauthorized commands, mimicking the role of the cluster administrator. This vulnerability may enable unintended modifications to the cluster's configuration or operational status, posing significant risks to the integrity and security of the Red Hat environment.

References

CVSS V3.1

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-11393 : Configuration Flaw in Internal Proxy of Red Hat Runtimes Inventory Operator