Excessive Permissions in Red Hat Openshift AI Service TrustyAI
CVE-2025-12103
Key Information:
- Vendor
Red Hat
- Vendor
- CVE Published:
- 28 October 2025
What is CVE-2025-12103?
A security flaw in the TrustyAI component of Red Hat Openshift AI Service allows all service accounts and users within a cluster to gain unrestricted access to pod information across all namespaces. This vulnerability arises from the creation of a role, trustyai-service-operator-lmeval-user-role, and a ClusterRoleBinding, trustyai-service-operator-default-lmeval-user-rolebinding, that is inadvertently assigned to system:authenticated. Consequently, every user or service account can list pods in any namespace, as well as access all persistentvolumeclaims and lmevaljobs, creating potential security risks across the platform.
Affected Version(s)
Red Hat OpenShift AI 3.0 sha256:43322a7cecd6fe3309faa160bf92d88518c23b98c6467e5e868a9dbdd3f16b36
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved