In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00161}

epss

{'score': 0.0018}


Tue, 08 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Jul 2025 17:30:00 +0000

Type Values Removed Values Added
Description In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.
Title Arbitrary executable upload via authenticated endpoint
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published: 2025-07-08T17:20:04.608Z

Updated: 2025-07-08T17:36:20.075Z

Reserved: 2025-01-31T10:43:45.458Z

Link: CVE-2025-0928

cve-icon Vulnrichment

Updated: 2025-07-08T17:35:34.900Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-08T18:15:26.767

Modified: 2025-07-10T13:18:53.830

Link: CVE-2025-0928

cve-icon Redhat

No data.