Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
No PoCs from references.
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462
- https://github.com/CryingN/CVE-2025-32462
- https://github.com/DaadaAyoze/CVE-2025-32463-lab
- https://github.com/Dlodlos/CVE-2025-32463-lab
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/Ilansos/ansible-sudo-cve2025-patch
- https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
- https://github.com/MGunturG/CVE-2025-32463
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/SpongeBob-369/cve-2025-32462
- https://github.com/Tan-JunWei/Ethically_Hacking
- https://github.com/Threekiii/CVE
- https://github.com/cyberpoul/CVE-2025-32462-POC
- https://github.com/cybersentinelx1/CVE-2025-32462-Exploit
- https://github.com/j3r1ch0123/CVE-2025-32462
- https://github.com/junxian428/CVE-2025-32463
- https://github.com/mibeyki/sudo_ansible_patch
- https://github.com/mylovem313/CVE-2025-32462
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/tanjiti/sec_profile
- https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-
- https://github.com/voidr3aper-anon/ghost
- https://github.com/xtaran/sshudo
- https://github.com/yembors64632/cve_monitor_Public
- https://github.com/zenzue/sudo-CVE-2025-Toolkit
- https://github.com/zhanpengliu-tencent/medium-cve