A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
No PoCs from references.
- https://github.com/00xCanelo/CVE-2025-27591
- https://github.com/BridgerAlderson/CVE-2025-27591-PoC
- https://github.com/Cythonic1/CVE-2025-27591
- https://github.com/DarksBlackSk/CVE-2025-27591
- https://github.com/Diabl0xE/CVE-2025-27519
- https://github.com/HOEUN-Visai/CVE-2025-27591-below-
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/Thekin-ctrl/CVE-2025-27591-Below
- https://github.com/alialucas7/CVE-2025-27591_PoC
- https://github.com/avina5hr/Cyber-security
- https://github.com/benkyouGH/RandomScripts
- https://github.com/benkyousec/RandomScripts
- https://github.com/danil-koltsov/below-log-race-poc
- https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/incommatose/CVE-2025-27591-PoC
- https://github.com/mridulchamoli93/htb-md-
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/obamalaolu/CVE-2025-27591
- https://github.com/rvizx/CVE-2025-27591
- https://github.com/umutcamliyurt/CVE-2025-27591
- https://github.com/yembors64632/cve_monitor_Public