CVE-2025-12548

CRITICAL EXPLOITED

Eclipse Che - RCE

Title source: llm
STIX 2.1

Description

A flaw was found in Eclipse Che che-machine-exec. This vulnerability allows unauthenticated remote arbitrary command execution and secret exfiltration (SSH keys, tokens, etc.) from other users' Developer Workspace containers, via an unauthenticated JSON-RPC / websocket API exposed on TCP port 3333.

Exploits (1)

metasploit WORKING POC EXCELLENT
by Richard Leach, Greg Durys <[email protected]> · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/eclipse_che_machine_exec_rce.rb

References (5)

Core 5
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:22620
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:22623
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:22652
Vendor Advisory vdb-entry x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2025-12548
Issue Tracking issue-tracking x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2408850

Scores

CVSS v3 9.0
EPSS 0.4368
EPSS Percentile 97.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

VulnCheck KEV 2026-04-15
CWE
CWE-306
Status published
Products (3)
Red Hat/Red Hat OpenShift Dev Spaces (RHOSDS) 3.22 sha256:3de7dd8077a9201eb7ff56c340629184773d6c06de9d6e083e13c5b51a82009c
Red Hat/Red Hat OpenShift Dev Spaces (RHOSDS) 3.23 sha256:a6fe7e233fa23e1fff9c74c5d4cbe800534561131b5be59533e88ede24452e3a
Red Hat/Red Hat OpenShift Dev Spaces (RHOSDS) 3.24 sha256:ced0e45c01cb5f473deb4fb137249b743b907d27172fbabd223024c4000ba56f
Published Jan 13, 2026
Tracked Since Feb 18, 2026