CVE-2025-32955

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-32955
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-32955.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-32955
Aliases
Published
2025-04-21T21:15:20Z
Modified
2025-05-28T10:28:08.512418Z
Summary
[none]
Details

Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Versions from 0.12.0 to before 2.12.0 are vulnerable to disable-sudo bypass. Harden-Runner includes a policy option disable-sudo to prevent the GitHub Actions runner user from using sudo. This is implemented by removing the runner user from the sudoers file. However, this control can be bypassed as the runner user, being part of the docker group, can interact with the Docker daemon to launch privileged containers or access the host filesystem. This allows the attacker to regain root access or restore the sudoers file, effectively bypassing the restriction. This issue has been patched in version 2.12.0.

References

Affected packages

Git / github.com/step-security/harden-runner

Affected ranges

Type
GIT
Repo
https://github.com/step-security/harden-runner
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v0.*

v0.1.0
v0.1.1
v0.2.0
v0.3.0
v0.4.0

Other

v1

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.0.4
v1.1.0
v1.2.0
v1.3.0
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.5.0

v2.*

v2.0.0
v2.1.0
v2.10.0
v2.10.1
v2.10.2
v2.10.3
v2.10.4
v2.11.0
v2.11.1
v2.2.0
v2.2.1
v2.3.0
v2.3.1
v2.4.0
v2.4.1
v2.5.0
v2.5.1
v2.6.0
v2.6.1
v2.7.0
v2.7.1
v2.8.0
v2.8.1
v2.9.0
v2.9.1