Kloxo versions 6.1.12 and earlier contain two setuid root...
High severity
Unreviewed
Published
Aug 1, 2025
to the GitHub Advisory Database
•
Updated Aug 1, 2025
Description
Published by the National Vulnerability Database
Aug 1, 2025
Published to the GitHub Advisory Database
Aug 1, 2025
Last updated
Aug 1, 2025
Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
References