CVE-2025-14946Argument Injection in RED HAT Libnbd

CWE-88Argument Injection6 documents6 sources
Severity
4.8MEDIUMNVD
EPSS
0.0%
top 89.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 19

Description

A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:LExploitability: 1.3 | Impact: 3.4

Affected Packages3 packages

debiandebian/libnbd< libnbd 1.22.5-1 (forky)
CVEListV5red_hat/libnbd1.22.01.22.5+1
Debianredhat/libnbd< 1.22.5-1

🔴Vulnerability Details

2
GHSA
GHSA-mcgc-vc2p-cf7x: A flaw was found in libnbd2025-12-19
OSV
CVE-2025-14946: A flaw was found in libnbd2025-12-19

📋Vendor Advisories

2
Red Hat
libnbd: libnbd: Arbitrary code execution via SSH argument injection through a malicious URI2025-12-16
Debian
CVE-2025-14946: libnbd - A flaw was found in libnbd. A malicious actor could exploit this by convincing l...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-14946 Impact, Exploitability, and Mitigation Steps | Wiz