CVSS Score: 6.7 Published: 2025-12-30 Full Report: https://cvereports.com/reports/CVE-2025-69257
A classic Local Privilege Escalation (LPE) in the 'theshit' command correction utility, allowing unprivileged users to execute arbitrary Python code as root due to unsafe loading of user configuration files.
The command-line tool theshit loads custom Python rule files from the user's configuration directory. Prior to version 0.1.1, it failed to verify file ownership when running with elevated privileges (e.g., via sudo). An attacker can place a malicious Python script in their own config folder, wait for an administrator to run the tool to fix a command, and achieve immediate root code execution.
- CWE ID: CWE-269
- Attack Vector: Local (AV:L)
- CVSS: 6.7 (Medium)
- Impact: Privilege Escalation (Root)
- Component: Python Rule Loader
- Exploit Status: High Probability / Trivial
- Linux systems with
theshitinstalled - macOS systems with
theshitinstalled - theshit: < 0.1.1 (Fixed in:
0.1.1)
- Input Validation
- Privilege Dropping
- File Integrity Checks
Remediation Steps:
- Upgrade
theshitto version 0.1.1 immediately. - Audit
~/.config/theshit/rules/for suspicious Python scripts. - Remove
sudoprivileges for this utility if granted via/etc/sudoers.
Generated by CVEReports - Automated Vulnerability Intelligence