CWE-271

Privilege Dropping / Lowering Errors

4 CVEs Avg CVSS 7.1 MITRE
0
CRITICAL
3
HIGH
1
MEDIUM
0
LOW
0
POC
0
KEV

Monthly

CVE-2026-35535 HIGH This Week

Privilege escalation to root in Sudo ≤1.9.17p2 occurs when setuid/setgid/setgroups system calls fail during the mailer privilege-drop sequence, allowing local attackers with high complexity exploitation to gain full system control. Confirmed actively exploited (CISA KEV). EPSS score and public exploit code status indicate significant real-world risk despite the high attack complexity barrier.

Privilege Escalation
NVD GitHub VulDB
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-25704 MEDIUM This Month

Cosmic-greeter before PR #426 contains a privilege dropping race condition vulnerability (CWE-271) that allows local attackers to regain dropped privileges through TOCTOU timing manipulation during privilege validation checks. The vulnerability affects the Pop!_OS greeter application and could enable privilege escalation to perform actions with elevated permissions that should have been restricted.

Information Disclosure Suse
NVD VulDB
CVSS 4.0
5.8
EPSS
0.0%
CVE-2025-53819 HIGH PATCH This Week

CVE-2025-53819 is a privilege escalation vulnerability in Nix 2.30.0 on macOS where package builds are incorrectly executed with root privileges instead of restricted build user accounts. This affects macOS systems running Nix 2.30.0, allowing local attackers with standard user privileges to execute arbitrary code with root-level access during package builds. The vulnerability was patched in Nix 2.30.1, and no public exploits or known workarounds are currently available, though the high CVSS score (7.9) reflects the severity of privilege escalation with potential system-wide impact.

Information Disclosure Apple macOS
NVD GitHub
CVSS 3.1
7.9
EPSS
0.0%
CVE-2025-23395 HIGH PATCH This Month

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.

Privilege Escalation Redhat Suse
NVD
CVSS 4.0
7.3
EPSS
0.1%
CVE-2026-35535
EPSS 0% CVSS 7.4
HIGH This Week

Privilege escalation to root in Sudo ≤1.9.17p2 occurs when setuid/setgid/setgroups system calls fail during the mailer privilege-drop sequence, allowing local attackers with high complexity exploitation to gain full system control. Confirmed actively exploited (CISA KEV). EPSS score and public exploit code status indicate significant real-world risk despite the high attack complexity barrier.

Privilege Escalation
NVD GitHub VulDB
CVE-2026-25704
EPSS 0% CVSS 5.8
MEDIUM This Month

Cosmic-greeter before PR #426 contains a privilege dropping race condition vulnerability (CWE-271) that allows local attackers to regain dropped privileges through TOCTOU timing manipulation during privilege validation checks. The vulnerability affects the Pop!_OS greeter application and could enable privilege escalation to perform actions with elevated permissions that should have been restricted.

Information Disclosure Suse
NVD VulDB
CVE-2025-53819
EPSS 0% CVSS 7.9
HIGH PATCH This Week

CVE-2025-53819 is a privilege escalation vulnerability in Nix 2.30.0 on macOS where package builds are incorrectly executed with root privileges instead of restricted build user accounts. This affects macOS systems running Nix 2.30.0, allowing local attackers with standard user privileges to execute arbitrary code with root-level access during package builds. The vulnerability was patched in Nix 2.30.1, and no public exploits or known workarounds are currently available, though the high CVSS score (7.9) reflects the severity of privilege escalation with potential system-wide impact.

Information Disclosure Apple macOS
NVD GitHub
CVE-2025-23395
EPSS 0% CVSS 7.3
HIGH PATCH This Month

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.

Privilege Escalation Redhat Suse
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy