Excessive Permissions in Red Hat Openshift AI Service TrustyAI
CVE-2025-12103

5MEDIUM

What is CVE-2025-12103?

A security flaw in the TrustyAI component of Red Hat Openshift AI Service allows all service accounts and users within a cluster to gain unrestricted access to pod information across all namespaces. This vulnerability arises from the creation of a role, trustyai-service-operator-lmeval-user-role, and a ClusterRoleBinding, trustyai-service-operator-default-lmeval-user-rolebinding, that is inadvertently assigned to system:authenticated. Consequently, every user or service account can list pods in any namespace, as well as access all persistentvolumeclaims and lmevaljobs, creating potential security risks across the platform.

Affected Version(s)

Red Hat OpenShift AI 3.0 sha256:43322a7cecd6fe3309faa160bf92d88518c23b98c6467e5e868a9dbdd3f16b36

References

CVSS V3.1

Score:
5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-12103 : Excessive Permissions in Red Hat Openshift AI Service TrustyAI