nomisec
WORKING POC
514 stars
by pr0v3rbs · local
https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
This repository contains a proof-of-concept exploit for CVE-2025-32463, a privilege escalation vulnerability in sudo's chroot feature. The exploit leverages a flawed chroot implementation to spawn a root shell by manipulating the NSS (Name Service Switch) configuration.
Classification
Working Poc 100%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
User with sudo privileges · Vulnerable sudo version (1.9.14 to 1.9.17)
nomisec
WORKING POC
448 stars
by kh4sh3i · local
https://github.com/kh4sh3i/CVE-2025-32463
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2025-32463, targeting a vulnerability in sudo's chroot functionality. The exploit leverages a crafted shared library to escalate privileges to root.
Classification
Working Poc 95%
Target:
sudo 1.9.14 to 1.9.17
Auth required
Prerequisites:
Local access to the system · Sudo version 1.9.14 to 1.9.17 · Ability to compile C code
nomisec
WORKING POC
45 stars
by MohamedKarrab · local
https://github.com/MohamedKarrab/CVE-2025-32463
This repository contains a privilege escalation exploit for CVE-2025-32463, targeting sudo versions 1.9.14 to 1.9.16. The exploit leverages the `--chroot` option in sudo to execute a malicious shared library, granting root access without requiring gcc on the target system.
Classification
Working Poc 95%
Target:
sudo 1.9.14, 1.9.15, 1.9.16
Auth required
Prerequisites:
User with sudo privileges · Target system running vulnerable sudo version
nomisec
WORKING POC
24 stars
by K1tt3h · local
https://github.com/K1tt3h/CVE-2025-32463-POC
This PoC exploits CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. It abuses the --chroot (-R) feature by creating a malicious shared object in a fake chroot environment, leading to root privilege execution.
Classification
Working Poc 100%
Target:
sudo 1.9.14 to 1.9.17
No auth needed
Prerequisites:
Linux system with vulnerable sudo version · gcc and build tools installed
nomisec
WORKING POC
23 stars
by mirchr · local
https://github.com/mirchr/CVE-2025-32463-sudo-chwoot
This repository contains a PoC for CVE-2025-32463, a sudo chroot elevation of privilege vulnerability. The exploit leverages a race condition in sudo's chroot handling to escalate privileges to root.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
Access to a system with vulnerable sudo version · Ability to execute sudo commands
nomisec
WORKING POC
13 stars
by Nowafen · poc
https://github.com/Nowafen/CVE-2025-32463
This repository contains a Go-based exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit manipulates the chroot environment to load a malicious shared library, granting root access.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
Go 1.2+ · gcc · libc-dev · vulnerable sudo version · non-privileged user with sudo access and --chroot permissions
nomisec
WORKING POC
13 stars
by zinzloun · local
https://github.com/zinzloun/CVE-2025-32463
This repository contains a functional PoC exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit leverages a chroot environment and a precompiled library to escalate privileges to root.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
sudo with chroot support (-R) · nsswitch enabled · low-privileged user access
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-32463
The repository contains a functional SQL injection exploit for CVE-2025-10042, targeting WordPress Quiz Maker plugin versions <= 6.7.0.56. The exploit uses time-based blind SQLi to extract admin credentials and hashes.
Classification
Working Poc 95%
Target:
WordPress Quiz Maker <= 6.7.0.56
No auth needed
Prerequisites:
target WordPress URL · path to quiz page · vulnerable header for injection
nomisec
WORKING POC
9 stars
by IC3-512 · poc
https://github.com/IC3-512/linux-root-kit
This repository demonstrates a full forensic investigation and attack simulation involving a Python dependency confusion attack, privilege escalation via CVE-2025-32463 (vulnerable sudo), deployment of a Sliver C2 beacon, and a custom rootkit with kernel module loading and syscall hooking. It includes scripts, setup instructions, and detailed analysis steps for replication.
Classification
Working Poc 95%
Target:
sudo 1.9.16p2
No auth needed
Prerequisites:
Vulnerable sudo version with chroot support · Python environment for dependency confusion · Kernel module loading capabilities · Sliver C2 infrastructure
nomisec
WRITEUP
8 stars
by AdityaBhatt3010 · poc
https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462
This repository contains a detailed writeup about CVE-2025-32463 and CVE-2025-32462, two sudo privilege escalation vulnerabilities. It explains the root cause, exploitation technique, affected versions, and mitigation steps.
Classification
Writeup 100%
Target:
sudo versions prior to 1.9.17p1
Auth required
Prerequisites:
Local user access · Misconfigured sudoers rules with wildcards
nomisec
WORKING POC
6 stars
by Maalfer · poc
https://github.com/Maalfer/Sudo-CVE-2021-3156
This exploit leverages a vulnerability in sudo (CVE-2025-32463) to achieve local privilege escalation by injecting a malicious shared library via the -R flag, bypassing security checks. The payload spawns a root shell or executes arbitrary commands.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
Local access to a vulnerable system · gcc installed for compilation · sudo binary present
nomisec
WORKING POC
6 stars
by K3ysTr0K3R · local
https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT
This is a functional privilege escalation exploit for CVE-2025-32463, targeting a vulnerability in sudo versions 1.9.14 through 1.9.17. The exploit leverages improper path validation in sudo's chroot functionality to load a malicious NSS library, granting root privileges.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 through 1.9.17
No auth needed
Prerequisites:
Local access to the target system · gcc installed on the target system · sudo installed on the target system
nomisec
WORKING POC
5 stars
by FreeDurok · local
https://github.com/FreeDurok/CVE-2025-32463-PoC
This repository contains a functional privilege escalation PoC for CVE-2025-32463, exploiting sudo's -R option with manipulated NSS configurations to gain root access. The exploit compiles a malicious shared library that spawns a root shell when loaded.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
Local user access · sudo installed on the system · gcc available to compile the shared library
github
WORKING POC
5 stars
by MAAYTHM · shelllocal
https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
This repository contains a functional exploit PoC for CVE-2025-32463, a sudo chroot NSS library escape vulnerability, and CVE-2025-32462, a sudo host matching logic bypass. It includes a Docker-based lab environment, detailed exploitation steps, and an automated script to trigger the vulnerability.
Classification
Working Poc 100%
Target:
sudo 1.9.16p2
Auth required
Prerequisites:
Access to a vulnerable sudo version · Ability to modify /etc/sudoers for CVE-2025-32462 · Ability to create directories and compile code for CVE-2025-32463
github
WORKING POC
4 stars
by behnamvanda · shelllocal
https://github.com/behnamvanda/CVE-2025-32463
The repository contains a functional exploit for CVE-2025-32463, a privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit leverages the chroot (`-R` flag) feature to gain root access by manipulating the `nsswitch.conf` file and injecting a malicious shared library.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
No auth needed
Prerequisites:
sudo with chroot support · gcc compiler · non-privileged user access
nomisec
WORKING POC
4 stars
by SysMancer · local
https://github.com/SysMancer/CVE-2025-32463
This exploit leverages a vulnerability in Sudo (CVE-2025-32463) to achieve local privilege escalation by manipulating the chroot environment and injecting a malicious shared library. The PoC compiles a shared object that spawns a root shell when loaded by Sudo.
Classification
Working Poc 95%
Target:
Sudo v1.9.15p5
No auth needed
Prerequisites:
Unprivileged user access · Sudo v1.9.15p5 installed · GCC or compatible compiler available
nomisec
WORKING POC
4 stars
by y4ney · local
https://github.com/y4ney/CVE-2025-32463-lab
This repository provides a Docker-based lab environment for CVE-2025-32463, a sudo local privilege escalation vulnerability. It includes a PoC exploit script (`sudo-chwoot.sh`) that leverages a chroot bypass to gain root access.
Classification
Working Poc 95%
Target:
sudo (specific version not specified)
Auth required
Prerequisites:
Docker environment · Vulnerable sudo version installed
nomisec
WORKING POC
3 stars
by nflatrea · local
https://github.com/nflatrea/CVE-2025-32463
This repository contains a proof-of-concept exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit abuses the --chroot (-R) feature to load a malicious NSS module with root privileges.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
No auth needed
Prerequisites:
Linux system with vulnerable sudo version · gcc and basic build tools installed
nomisec
WORKING POC
2 stars
by KaiHT-Ladiant · local
https://github.com/KaiHT-Ladiant/CVE-2025-32463
This repository contains a functional privilege escalation exploit for CVE-2025-32463, targeting a design flaw in sudo's chroot option processing. The exploit manipulates the NSS library loading mechanism to gain root access via a malicious shared library.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 through 1.9.17
Auth required
Prerequisites:
sudo privileges · gcc compiler · write access to /tmp · sudoers configuration allowing chroot operations
nomisec
WORKING POC
2 stars
by pevinkumar10 · local
https://github.com/pevinkumar10/CVE-2025-32463
This repository contains a Python PoC for CVE-2025-32463, a local privilege escalation vulnerability in Sudo versions 1.9.14 to 1.9.17. The exploit leverages a malicious nsswitch.conf file and a custom NSS module to gain root privileges via the --chroot (-R) option.
Classification
Working Poc 95%
Target:
Sudo 1.9.14 - 1.9.17
No auth needed
Prerequisites:
Local access to a vulnerable system · Ability to execute sudo -R · No sudo permissions required
github
SCANNER
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-32463
The repository contains a scanner for CVE-2024-21762, which checks for the presence of the vulnerability in Fortinet SSL VPN interfaces by sending crafted HTTP requests. It does not include exploit code but provides detection capabilities.
Classification
Scanner 90%
Target:
Fortinet SSL VPN
No auth needed
Prerequisites:
network access to the target Fortinet SSL VPN interface
nomisec
WORKING POC
2 stars
by Yuy0ung · local
https://github.com/Yuy0ung/CVE-2025-32463_chwoot
This repository contains a PoC for CVE-2025-32463, a local privilege escalation (LPE) vulnerability in sudo's handling of the -R option. The exploit leverages a malicious shared library to escalate privileges to root, with support for both compiled and precompiled payloads.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
sudo access with -R option allowed · ability to write to /tmp
nomisec
WORKING POC
2 stars
by Mikivirus0 · local
https://github.com/Mikivirus0/sudoinjection
This PoC demonstrates a local privilege escalation (LPE) via CVE-2025-32463 by abusing `sudo -R` with a malicious NSS module to drop a setuid root shell. The exploit leverages unsafe handling of `nsswitch.conf` and NSS shared libraries in a chroot environment.
Classification
Working Poc 95%
Target:
sudo (versions affected by CVE-2025-32463)
Auth required
Prerequisites:
Local access to a vulnerable system · Ability to compile C code · sudo access
nomisec
WORKING POC
2 stars
by 7r00t · poc
https://github.com/7r00t/cve-2025-32463-lab
This repository contains a Docker-based lab and a functional exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit abuses the `--chroot` option and a malicious NSS module to gain root access.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
Access to a vulnerable sudo version · Ability to compile a shared object · User privileges to run sudo commands
github
WORKING POC
1 stars
by dr4x-c0d3r · pythonlocal
https://github.com/dr4x-c0d3r/sudo-chroot
This repository contains a functional local privilege escalation exploit for CVE-2025-32463, leveraging sudo's chroot option to execute arbitrary code as root via a malicious nsswitch.conf and shared library. The exploit compiles a C payload into a shared library and manipulates sudo's behavior to gain root access.
Classification
Working Poc 95%
Target:
sudo before 1.9.17p1
Auth required
Prerequisites:
Local user access · gcc installed · sudo permissions
github
SUSPICIOUS
1 stars
by r3dBust3r · shellpoc
https://github.com/r3dBust3r/CVE-2025-32463
The repository claims to contain an exploit for CVE-2025-32463 but only provides a README with generic instructions and no actual exploit code. It references an ExploitDB entry but does not include functional code or technical details.
Classification
Suspicious 90%
Target:
Sudo 1.9.14 to 1.9.17
Auth required
Prerequisites:
Vulnerable sudo version (1.9.14-1.9.17) · Local account access
nomisec
WORKING POC
1 stars
by san8383 · local
https://github.com/san8383/CVE-2025-32463
This PoC exploits CVE-2025-32463, a privilege escalation vulnerability in Sudo versions 1.9.14 to 1.9.17, by manipulating the chroot feature and leveraging a malicious shared library to gain root access.
Classification
Working Poc 95%
Target:
Sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
User must have sudo privileges · Sudo version 1.9.14 to 1.9.17 must be installed
nomisec
WORKING POC
1 stars
by ashardev002 · local
https://github.com/ashardev002/CVE-2025-32463_chwoot
This repository contains a proof-of-concept exploit for CVE-2025-32463, which leverages a vulnerability in sudo to escalate privileges to root via the chroot option. The exploit involves compiling a shared library that hooks into the sudo binary to execute arbitrary commands with root privileges.
Classification
Working Poc 90%
Target:
sudo (specific version not specified)
Auth required
Prerequisites:
Docker installed · sudo access · gcc compiler
nomisec
WORKING POC
1 stars
by dr4xp · local
https://github.com/dr4xp/sudo-chroot
This exploit leverages a vulnerability in sudo before 1.9.17p1 where the --chroot option improperly uses /etc/nsswitch.conf from a user-controlled directory, allowing local privilege escalation to root. The PoC compiles a shared library that spawns a root shell when loaded via a crafted nsswitch.conf.
Classification
Working Poc 95%
Target:
sudo before 1.9.17p1
Auth required
Prerequisites:
Local user access · sudo installed and vulnerable version · gcc available for compilation
nomisec
WORKING POC
1 stars
by krypton-0x00 · local
https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC
This is a Rust-based exploit for CVE-2025-32463, a sudo privilege escalation vulnerability. It leverages a malicious shared library to escalate privileges to root by exploiting sudo's handling of the NSS (Name Service Switch) configuration.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
gcc · sudo access · ability to write to /tmp
nomisec
WORKING POC
1 stars
by wvverez · local
https://github.com/wvverez/CVE-2025-32463
This exploit abuses the LD_PRELOAD environment variable in vulnerable sudo versions (1.9.14-1.9.17) to achieve local privilege escalation by injecting a malicious shared library that spawns a root shell.
Classification
Working Poc 95%
Target:
sudo 1.9.14-1.9.17
Auth required
Prerequisites:
gcc installed · local user access · sudo access
nomisec
WORKING POC
1 stars
by 0p5cur · poc
https://github.com/0p5cur/CVE-2025-32463-POC
This repository contains a functional exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit leverages the --chroot option to force sudo to load a malicious NSS library, resulting in root code execution.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
vulnerable sudo version · gcc installed · ability to run sudo -R with arbitrary directory
github
WORKING POC
1 stars
by NewComrade12211 · shelllocal
https://github.com/NewComrade12211/CVE-2025-32463
This repository contains a functional exploit for CVE-2025-32463, targeting a vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit leverages a malicious shared library to escalate privileges to root by manipulating the `sudo -R` feature.
Classification
Working Poc 95%
Target:
sudo 1.9.14 to 1.9.17
No auth needed
Prerequisites:
Access to a system with vulnerable sudo version · Ability to compile shared libraries
nomisec
WORKING POC
1 stars
by 4f-kira · local
https://github.com/4f-kira/CVE-2025-32463
This repository contains a proof-of-concept exploit for CVE-2025-32463, a sudo privilege escalation vulnerability via chroot manipulation. The exploit leverages a malicious shared library to escalate privileges to root.
Classification
Working Poc 90%
Target:
sudo (version not specified)
Auth required
Prerequisites:
Access to a system with vulnerable sudo version · Ability to compile and execute code
nomisec
WORKING POC
1 stars
by SpongeBob-369 · local
https://github.com/SpongeBob-369/cve-2025-32463
This PoC exploits CVE-2025-32463, a privilege escalation vulnerability in sudo v1.9.14+ where chroot's NSS handling allows loading malicious shared libraries via a crafted /etc/nsswitch.conf. The exploit constructs a fake chroot environment with a malicious NSS module to gain root execution.
Classification
Working Poc 95%
Target:
sudo v1.9.14+
Auth required
Prerequisites:
sudo access · ability to create directories/files · gcc for compiling malicious library
nomisec
WORKING POC
1 stars
by abrewer251 · local
https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC
This PoC exploits CVE-2025-32463, a local privilege escalation vulnerability in sudo (v1.9.14 - v1.9.17) via the --chroot option. It creates a malicious chroot environment with a fake NSS module to execute code as root.
Classification
Working Poc 95%
Target:
sudo v1.9.14 - v1.9.17
Auth required
Prerequisites:
sudo with --chroot permission · gcc for compiling payload · Python 3
github
WORKING POC
1 stars
by cybershaolin47 · shellpoc
https://github.com/cybershaolin47/CVE-2025-32463_POC
This repository contains a functional local privilege escalation exploit for CVE-2025-32463, leveraging sudo's -R/--chroot option to load attacker-controlled NSS modules from a user-supplied chroot environment. The exploit compiles a shared library (exp.c) that escalates privileges to root via setreuid/setregid and spawns a root shell.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 through 1.9.17
Auth required
Prerequisites:
Local user access · GCC installed · Vulnerable sudo version
nomisec
WORKING POC
1 stars
by 0xb0rn3 · local
https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT
This is a proof-of-concept exploit for CVE-2023-42456, targeting a privilege escalation vulnerability in sudo versions 1.9.14 through 1.9.16p1. The exploit leverages NSS library hijacking via the `-R` chroot flag to gain root access.
Classification
Working Poc 100%
Target:
sudo (1.9.14 - 1.9.16p1)
Auth required
Prerequisites:
User with sudo permissions including `ChrootDir` directive · Control over the chroot directory · Vulnerable sudo version
nomisec
STUB
1 stars
by Chocapikk · poc
https://github.com/Chocapikk/CVE-2025-32463-lab
The repository contains minimal setup instructions for a lab environment related to CVE-2025-32463 but lacks exploit code or technical details. It only includes a Docker Compose command and a connection instruction.
Target:
unspecified
No auth needed
Prerequisites:
Docker environment
github
WORKING POC
by shazed-x · shellpoc
https://github.com/shazed-x/CVE-2025-32463
This repository contains a functional exploit for CVE-2025-32463, a vulnerability in sudo versions 1.9.14 to 1.9.16. The exploit leverages the --chroot option to achieve local privilege escalation (LPE) by manipulating the NSS (Name Service Switch) configuration to execute arbitrary code as root.
Classification
Working Poc 95%
Target:
sudo 1.9.14, 1.9.15, 1.9.16
Auth required
Prerequisites:
User must have sudo privileges · Target system must be running a vulnerable sudo version · Access to the target machine
nomisec
WRITEUP
by CIA911 · poc
https://github.com/CIA911/sudo_patch_CVE-2025-32463
This repository provides a manual patching guide and script for CVE-2025-32463, a local privilege escalation vulnerability in Sudo versions 1.9.14–1.9.17. The script automates the process of downloading, compiling, and installing a patched version of Sudo (1.9.17p1) and includes additional steps to sanitize the sudoers file.
Classification
Writeup 95%
Target:
Sudo 1.9.14–1.9.17
Auth required
Prerequisites:
root access · internet connection · build tools
nomisec
WORKING POC
by mihnasdsad · poc
https://github.com/mihnasdsad/CVE-2025-32463
This repository contains a working PoC exploit for CVE-2025-32463, a local privilege escalation vulnerability in Linux systems via the `sudo chroot` command. The exploit leverages a malicious shared library to escalate privileges to root.
Classification
Working Poc 90%
Target:
sudo (specific version not specified)
Auth required
Prerequisites:
Access to a vulnerable Linux system with sudo privileges · GCC compiler to compile the shared library
nomisec
WORKING POC
by Mr-Alperen · poc
https://github.com/Mr-Alperen/CVE-2025-32463
This PoC exploits a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17 by leveraging the --chroot option to load a malicious NSS library, resulting in root shell access.
Classification
Working Poc 95%
Target:
sudo 1.9.14 - 1.9.17
Auth required
Prerequisites:
User must have sudo access to some command · System must use NSS
nomisec
STUB
by Floodnut · poc
https://github.com/Floodnut/CVE-2025-32463
The repository contains only a README.md file with a placeholder for CVE-2025-32463, indicating no functional exploit code or technical details are present.
Target:
unknown
No auth needed
nomisec
SCANNER
by daryllundy · poc
https://github.com/daryllundy/CVE-2025-32463
This repository provides a detection framework for CVE-2025-32463, a privilege escalation vulnerability in sudo versions 1.9.14 through 1.9.17. It includes tools for monitoring system logs, command history, and process behavior to identify exploitation attempts.
Classification
Scanner 95%
Target:
sudo versions 1.9.14 through 1.9.17
Auth required
Prerequisites:
Local access to the target system · Vulnerable sudo version installed
nomisec
WORKING POC
by robbert1978 · poc
https://github.com/robbert1978/CVE-2025-32463_POC
This PoC exploits a vulnerability in `sudo` where it incorrectly parses `nsswitch.conf` after a `chroot`, leading to arbitrary library loading and privilege escalation. The `evil.c` file demonstrates a constructor-based payload that escalates privileges to root and spawns a shell.
Classification
Working Poc 90%
Target:
sudo (version not specified, likely recent)
No auth needed
Prerequisites:
Ability to execute code in a chroot environment · Presence of `libnss_systemd.so.2` or similar exploitable NSS module
nomisec
WORKING POC
by SpycioKon · poc
https://github.com/SpycioKon/CVE-2025-32463
This exploit leverages a vulnerability in sudo (CVE-2025-32463) to achieve local privilege escalation by manipulating the nsswitch configuration and loading a malicious shared library. The PoC compiles a C program that spawns a root shell via a constructor function, then uses sudo's -R flag to trigger the exploit.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
Local access to a vulnerable system · Ability to compile C code · sudo binary with the vulnerability present
gitlab
WORKING POC
by lowercasenumbers · poc
https://gitlab.com/lowercasenumbers/cve-2025-32463
This repository contains a functional proof-of-concept exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo's chroot feature. The exploit leverages a race condition in NSS library loading to escalate privileges to root.
Classification
Working Poc 100%
Target:
sudo versions 1.9.14 to 1.9.17
No auth needed
Prerequisites:
local access to a system with vulnerable sudo installed · ability to compile C code (gcc) · write access to /tmp or another directory
gitlab
WORKING POC
by FR4NC0X · poc
https://gitlab.com/FR4NC0X/sudo-chroot
This exploit leverages a vulnerability in sudo before 1.9.17p1 where the --chroot option improperly uses /etc/nsswitch.conf from a user-controlled directory, allowing local privilege escalation to root. The PoC compiles a shared library with a constructor that spawns a root shell, then uses sudo -R to trigger the exploit.
Classification
Working Poc 95%
Target:
sudo before 1.9.17p1
Auth required
Prerequisites:
local user access · gcc installed · sudo access with --chroot option
nomisec
WORKING POC
by neko205-mx · local
https://github.com/neko205-mx/CVE-2025-32463_Exploit
This exploit leverages a sudo chroot vulnerability (CVE-2025-32463) to achieve local privilege escalation by manipulating the nsswitch.conf file and loading a malicious shared library. The payload spawns a root shell upon execution.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
gcc installed · sudo access · vulnerable sudo version
nomisec
WORKING POC
by zhaduchanhzz · local
https://github.com/zhaduchanhzz/CVE-2025-32463_POC
This repository contains a proof-of-concept exploit for CVE-2025-32463, a privilege escalation vulnerability in sudo's chroot feature. The exploit leverages a malicious shared library to escalate privileges to root within a chroot environment.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
Access to a system with vulnerable sudo version · Ability to compile code on the target system
nomisec
WORKING POC
by 0xAkarii · local
https://github.com/0xAkarii/CVE-2025-32463
This exploit leverages a vulnerability in sudo (CVE-2025-32463) to achieve local privilege escalation by manipulating the nsswitch configuration and loading a malicious shared library. The payload spawns a root shell via a constructor function in a compiled C library.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
local access · sudo access · gcc installed
nomisec
WORKING POC
by ill-deed · local
https://github.com/ill-deed/CVE-2025-32463_illdeed
This repository contains a functional privilege escalation exploit for CVE-2025-32463, targeting sudo versions 1.9.14 through 1.9.17. The exploit leverages a fake NSS module and the `sudo -R` feature to execute arbitrary commands as root.
Classification
Working Poc 95%
Target:
sudo 1.9.14 to 1.9.17
Auth required
Prerequisites:
Local shell access · Ability to run `sudo -R` without a password · gcc installed
nomisec
WORKING POC
by yeremeu · local
https://github.com/yeremeu/CVE-2025-32463_chwoot
This repository contains a local privilege escalation exploit for CVE-2025-32463, targeting a vulnerability in the `sudo` command. The exploit leverages improper input validation to execute commands with root privileges via a crafted shared library and `nsswitch.conf` manipulation.
Classification
Working Poc 90%
Target:
sudo (versions affected on Ubuntu 20.04 LTS, Debian 10, CentOS 7, Fedora 34)
Auth required
Prerequisites:
Local access to the target system · Compilation tools (gcc) · Sudo access
nomisec
WORKING POC
by lowercasenumbers · local
https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot
This PoC exploits a race condition in sudo's chroot feature (CVE-2025-32463) by loading a malicious NSS library with root privileges, leading to local privilege escalation. The exploit compiles a shared library with a constructor that spawns a root shell when loaded by sudo during chroot operations.
Classification
Working Poc 100%
Target:
sudo versions 1.9.14 to 1.9.17
No auth needed
Prerequisites:
local access · gcc · write access to /tmp
nomisec
WORKING POC
by morgenm · local
https://github.com/morgenm/sudo-chroot-CVE-2025-32463
This is a Rust-based exploit for CVE-2025-32463, a sudo chroot vulnerability that allows privilege escalation by manipulating the nsswitch.conf file to load a malicious shared library. The payload spawns a root shell upon execution.
Classification
Working Poc 95%
Target:
sudo (version affected by CVE-2025-32463)
Auth required
Prerequisites:
sudo installed with vulnerable version · ability to execute sudo with chroot option
nomisec
WORKING POC
by Rajneeshkarya · local
https://github.com/Rajneeshkarya/CVE-2025-32463
This exploit leverages a vulnerability in sudo (CVE-2025-32463) to achieve local privilege escalation by manipulating the NSS (Name Service Switch) configuration via a malicious shared object. The exploit creates a fake chroot environment and tricks sudo into loading the malicious library, granting root access.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
Local access to a vulnerable system · Ability to compile code · Sudo access with the -R option permitted
nomisec
WORKING POC
by MGunturG · local
https://github.com/MGunturG/CVE-2025-32463
This exploit leverages a vulnerability in sudo's chroot functionality to escalate privileges to root by manipulating the nsswitch.conf file and injecting a malicious shared library. The PoC demonstrates a local privilege escalation (LPE) attack on Linux systems.
Classification
Working Poc 95%
Target:
sudo (version not specified)
No auth needed
Prerequisites:
Local access to the target system · GCC compiler to build the malicious shared library
nomisec
WORKING POC
by ChetanKomal · local
https://github.com/ChetanKomal/sudo_exploit
This exploit leverages a vulnerability in sudo (CVE-2025-32463) to achieve local privilege escalation by manipulating the nsswitch configuration and loading a malicious shared library. The exploit drops into a root shell or executes arbitrary commands as root.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
Local access to a vulnerable system · Ability to execute sudo with certain configurations
nomisec
WORKING POC
by aldoClau98 · local
https://github.com/aldoClau98/CVE-2025-32463
This PoC exploits a theoretical privilege escalation vulnerability in sudo (CVE-2025-32463) by manipulating the NSS configuration and loading a malicious shared library via the chroot functionality. The script dynamically decodes and writes a base64-encoded .so library to achieve elevated command execution.
Classification
Working Poc 95%
Target:
sudo (theoretical vulnerability)
Auth required
Prerequisites:
sudo access · ability to create temporary directories · ability to write files in /tmp
nomisec
WORKING POC
by painoob · local
https://github.com/painoob/CVE-2025-32463
This is a functional local privilege escalation (LPE) exploit for CVE-2025-32463, targeting a sudo chroot escape vulnerability. It leverages a malicious shared library and sudo's chroot handling to gain root access.
Classification
Working Poc 95%
Target:
sudo versions 1.9.0 to 1.9.17p1
Auth required
Prerequisites:
Vulnerable sudo version · User with chroot sudoers configuration · ELF binary permitted in chroot context
nomisec
WORKING POC
by blackcat4347 · local
https://github.com/blackcat4347/CVE-2025-32463_PoC
This PoC exploits CVE-2025-32463 by manipulating the Name Service Switch (NSS) configuration to load a malicious shared library, achieving local privilege escalation (LPE) via sudo. The exploit creates a fake NSS module that spawns a root shell when loaded.
Classification
Working Poc 95%
Target:
sudo (specific version not specified in PoC)
No auth needed
Prerequisites:
Access to a vulnerable system with sudo installed · Ability to write files to /tmp · GCC (for compilation, though precompiled binaries are provided)
nomisec
WORKING POC
by AC8999 · local
https://github.com/AC8999/CVE-2025-32463
This is a Python-based exploit for CVE-2025-32463, a local privilege escalation vulnerability in Sudo versions 1.9.14 through 1.9.16. The exploit leverages the --chroot option to load attacker-controlled configuration, leading to arbitrary code execution as root.
Classification
Working Poc 95%
Target:
Sudo versions 1.9.14 to 1.9.16
Auth required
Prerequisites:
Local user account with sudo access · Vulnerable Sudo version installed · GCC compiler available
nomisec
WORKING POC
by ankitpandey383 · local
https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation
This repository contains a functional exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit abuses the --chroot option to load a malicious shared library, granting root access.
Classification
Working Poc 95%
Target:
sudo 1.9.14 - 1.9.17
Auth required
Prerequisites:
Local access to a vulnerable system · Ability to compile C code · sudo access with chroot option enabled
nomisec
WORKING POC
by justjoeyking · local
https://github.com/justjoeyking/CVE-2025-32463
This exploit leverages a path resolution issue in Sudo 1.9.17 (CVE-2025-32463) where the --chroot option is evaluated before permission checks, allowing local privilege escalation to root via a malicious nsswitch.conf and shared library.
Classification
Working Poc 95%
Target:
Sudo 1.9.17
Auth required
Prerequisites:
Local user access · Sudo 1.9.17 installed · GCC or equivalent compiler
nomisec
WORKING POC
by aexdyhaxor · local
https://github.com/aexdyhaxor/CVE-2025-32463
This repository contains a functional privilege escalation exploit for CVE-2025-32463, targeting a vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit leverages a flaw in sudo's chroot support combined with nsswitch to escalate privileges to root.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
sudo with chroot support (-R) · nsswitch enabled · gcc installed
nomisec
WORKING POC
by danilo1992-sys · local
https://github.com/danilo1992-sys/CVE-2025-32463
The repository contains a functional exploit for CVE-2025-32463, a local privilege escalation vulnerability in Sudo (versions 1.9.14 to 1.9.17) that abuses the `--chroot` option to load malicious libraries via a crafted `/etc/nsswitch.conf`.
Classification
Working Poc 95%
Target:
Sudo (1.9.14 to 1.9.17)
Auth required
Prerequisites:
Local user access · Sudo with vulnerable version installed
nomisec
WORKING POC
by D3ltaFormation · poc
https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-Escape
This is a Python-based PoC for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 through 1.9.17. It exploits the Name Service Switch (NSS) mechanism to load a malicious shared object, escaping the chroot environment and executing arbitrary code as root.
Classification
Working Poc 95%
Target:
sudo (versions 1.9.14 to 1.9.17)
Auth required
Prerequisites:
sudo privileges with the chroot option enabled · gcc installed for compiling the payload
github
WORKING POC
by onniio · shelllocal
https://github.com/onniio/CVE-2025-32463
This repository contains a functional exploit for CVE-2025-32463, targeting a vulnerability in sudo 1.9.16p2. The exploit leverages a malicious shared library to escalate privileges to root via the sudo -R command.
Classification
Working Poc 95%
Target:
sudo 1.9.16p2
No auth needed
Prerequisites:
Access to a system with vulnerable sudo version · Ability to compile and execute the exploit
github
WORKING POC
by 0x3c4dfa1 · shellpoc
https://github.com/0x3c4dfa1/CVE-2025-32463
This exploit leverages a vulnerability in sudo (CVE-2025-32463) to achieve local privilege escalation (LPE) by manipulating the nsswitch configuration and loading a malicious shared library. The exploit compiles a shared object that spawns a root shell via a constructor function and tricks sudo into executing it.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
Local access to the target system · sudo installed and vulnerable to CVE-2025-32463
github
WORKING POC
by muhammedkayag · shellpoc
https://github.com/muhammedkayag/CVE-2025-32463
This repository contains a functional proof-of-concept exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions prior to 1.9.17p1. The exploit leverages a chroot-like environment to manipulate library resolution and gain root privileges.
Classification
Working Poc 95%
Target:
sudo versions prior to 1.9.17p1
No auth needed
Prerequisites:
Local access to the target system · Unpatched sudo version
github
WORKING POC
by khoazero123 · local
https://github.com/khoazero123/CVE-2025-32463
This repository contains a functional local privilege escalation (LPE) exploit for CVE-2025-32463 in sudo versions 1.9.14 to 1.9.17. The exploit leverages a vulnerability in sudo's chroot support combined with nsswitch to escalate privileges to root.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
sudo with chroot support (-R) · nsswitch enabled · low-privileged user access
nomisec
WORKING POC
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2025-32463
This repository contains a functional exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17 (before 1.9.17p1). The exploit leverages the `-R` (chroot) option to load a malicious NSS library, granting root access to any local user.
Classification
Working Poc 100%
Target:
sudo 1.9.14 to 1.9.17 (before 1.9.17p1)
No auth needed
Prerequisites:
local user access · gcc installed · sudo binary present
nomisec
WORKING POC
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2025-32463
This repository contains a functional exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17 (before 1.9.17p1). The exploit leverages the `-R` (chroot) option to load a malicious NSS library, granting root access to any local user.
Classification
Working Poc 100%
Target:
sudo 1.9.14 to 1.9.17 (before 1.9.17p1)
No auth needed
Prerequisites:
local user access · gcc installed · sudo binary present
github
WORKING POC
by wnaspy · shellpoc
https://github.com/wnaspy/CVE-POC-WEAPON/tree/main/CVE-2025-32463.sh
This PoC exploits a vulnerability in sudo (likely CVE-2025-32463) by manipulating the nsswitch configuration to load a malicious shared library, achieving local privilege escalation (LPE). The script compiles a shared object that spawns a root shell via a constructor function, then tricks sudo into loading it via a crafted environment.
Classification
Working Poc 95%
Target:
sudo (version not specified)
Auth required
Prerequisites:
local access · sudo access (non-root) · gcc installed
nomisec
WORKING POC
by vpr-labs · poc
https://github.com/vpr-labs/CVE-2025-32463
This repository contains a functional exploit for CVE-2025-32463, a privilege escalation vulnerability in sudo's chroot feature. The exploit leverages a flaw in sudo versions 1.9.14 to 1.9.17, allowing an attacker to escalate privileges to root by manipulating the chroot environment and exploiting improper handling of the -R option.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
Access to a system with vulnerable sudo version · Ability to execute sudo commands with the -R option
nomisec
WORKING POC
by dbarquero · poc
https://github.com/dbarquero/cve-2025-32463-lab
This repository provides a Docker-based lab to demonstrate CVE-2025-32463, a privilege escalation vulnerability via misconfigured sudo permissions. It includes a setup script to build a Debian environment with a user configured to exploit sudo without a password.
Classification
Working Poc 90%
Target:
sudo (misconfigured NOPASSWD:ALL)
Auth required
Prerequisites:
Docker installed · User with sudo privileges to set up the lab
nomisec
WORKING POC
by gmh5225 · poc
https://github.com/gmh5225/Blackash-CVE-2025-32463
This PoC exploits CVE-2025-32463, a local privilege escalation vulnerability in Sudo versions 1.9.14 through 1.9.17, by manipulating the nsswitch.conf file to load a malicious shared library, resulting in root access.
Classification
Working Poc 95%
Target:
Sudo 1.9.14 to 1.9.17
No auth needed
Prerequisites:
Local shell access · Sudo version 1.9.14 to 1.9.17
metasploit
WORKING POC
NORMAL
by msutovsky-r7, Stratascale, Rich Mirch · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/sudo_chroot_cve_2025_32463.rb
This Metasploit module exploits a privilege escalation vulnerability in Sudo versions 1.9.14 to 1.9.17 by manipulating the `chroot` option to load a malicious shared object, thereby gaining root privileges.
Classification
Working Poc 100%
Target:
Sudo 1.9.14 to 1.9.17
Auth required
Prerequisites:
Access to a vulnerable Sudo version · Write permissions in a directory (e.g., /tmp) · Sudoers configuration allowing the `chroot` option
vulncheck_xdb
WORKING POC
local
https://github.com/cyberpoul/CVE-2025-32463-POC
This repository contains a functional exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 to 1.9.17. The exploit leverages the --chroot option to force sudo to load a malicious NSS library, resulting in root code execution.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
vulnerable sudo version · gcc installed · ability to run sudo -R with arbitrary directory
vulncheck_xdb
WORKING POC
local
https://github.com/mirchr/security-research
The repository contains a functional exploit for CVE-2025-32463, a sudo privilege escalation vulnerability. The PoC script demonstrates the vulnerability by leveraging sudo's improper handling of chroot environments to escalate privileges.
Classification
Working Poc 95%
Target:
sudo (specific version not specified)
Auth required
Prerequisites:
Access to a vulnerable sudo configuration · Ability to execute scripts on the target system
vulncheck_xdb
WORKING POC
local
https://github.com/Adonijah01/cve-2025-32463-lab
This repository contains a functional Docker-based lab and exploit for CVE-2025-32463, a local privilege escalation vulnerability in sudo (1.9.14 to 1.9.17). The exploit abuses the `--chroot` option and a malicious NSS module to gain root access.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17
Auth required
Prerequisites:
sudo access to /bin/bash · ability to compile a shared object
vulncheck_xdb
WORKING POC
local
https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-Escape
This repository contains a functional Python-based PoC for CVE-2025-32463, a local privilege escalation vulnerability in sudo versions 1.9.14 through 1.9.17. The exploit abuses the Name Service Switch (NSS) mechanism to load a malicious shared object, allowing an attacker to escape a chroot environment and execute arbitrary code as root.
Classification
Working Poc 95%
Target:
sudo (versions 1.9.14 through 1.9.17)
Auth required
Prerequisites:
sudo privileges with the chroot option enabled · gcc installed for compiling the payload
exploitdb
WORKING POC
by Stratascale · textlocallinux
https://www.exploit-db.com/exploits/52352
This exploit leverages a vulnerability in sudo's chroot functionality (CVE-2025-32463) to achieve local privilege escalation by tricking sudo into loading a malicious shared library via a crafted /etc/nsswitch.conf file. The PoC compiles a shared library that spawns a root shell when loaded.
Classification
Working Poc 95%
Target:
sudo versions 1.9.14 to 1.9.17 inclusive
Auth required
Prerequisites:
Local access to a vulnerable system · Sudo access (even without explicit command permissions) · GCC or equivalent compiler to build the shared library