CVE-2025-6019

HIGH EXPLOITED

libblockdev - Privilege Escalation

Title source: llm

Description

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

Exploits (23)

nomisec WORKING POC 65 stars
by guinea-offensive-security · local
https://github.com/guinea-offensive-security/CVE-2025-6019
github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-6019
github WORKING POC 9 stars
by MichaelVenturella · shelllocal
https://github.com/MichaelVenturella/CVE-2025-6018-6019-PoC
github WORKING POC 9 stars
by muyuanlove · shellpoc
https://github.com/muyuanlove/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit
github WORKING POC 6 stars
by dreysanox · pythonremote-auth
https://github.com/dreysanox/CVE-2025-6018_Poc
nomisec WORKING POC 4 stars
by And-oss · local
https://github.com/And-oss/CVE-2025-6019-exploit
github WORKING POC 3 stars
by 0rionCollector · shelllocal
https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019
nomisec WORKING POC 3 stars
by neko205-mx · local
https://github.com/neko205-mx/CVE-2025-6019_Exploit
nomisec WORKING POC 1 stars
by boboaung1337 · local
https://github.com/boboaung1337/CVE-2025-6019
nomisec WORKING POC 1 stars
by JM00NJ · local
https://github.com/JM00NJ/CVE-2025-6019-udisks2-XFS-Resize-TOCTOU-Privilege-Escalation
github WORKING POC 1 stars
by Goultarde · shellremote-auth
https://github.com/Goultarde/CVE-2025-6018_CVE-2025-6019_autopwn
github SUSPICIOUS 1 stars
by AzureADTrent · poc
https://github.com/AzureADTrent/CVE-2025-6018-and-CVE-2025-6019-Privilege-Escalation
github WORKING POC 1 stars
by localh0ste · poc
https://github.com/localh0ste/CVE-2025-6018-and-CVE-2025-6019
github WORKING POC 1 stars
by DesertDemons · shellpoc
https://github.com/DesertDemons/CVE-2025-6018-6019
nomisec WRITEUP
by robbin0919 · local
https://github.com/robbin0919/CVE-2025-6019
nomisec WORKING POC
by harshitvarma05 · local
https://github.com/harshitvarma05/CVE-2025-6019
github WORKING POC
by MaxKappa · shelllocal
https://github.com/MaxKappa/opensuse-leap-privesc-exploit
github WORKING POC
by matesz44 · shelllocal
https://github.com/matesz44/CVE-2025-6018-19
nomisec WORKING POC
by 0x5chltz · local
https://github.com/0x5chltz/CVE-2025-6019
nomisec WORKING POC
by symphony2colour · local
https://github.com/symphony2colour/CVE-2025-6019-udisks-lpe-no-image
nomisec WORKING POC
by phamdinhquy2512 · local
https://github.com/phamdinhquy2512/CVE-2025-6019-Exploitation
nomisec WORKING POC
by HexRazor · local
https://github.com/HexRazor/CVE-2025-6019
vulncheck_xdb WORKING POC
local
https://github.com/iOxsec/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit

Scores

CVSS v3 7.0
EPSS 0.0001
EPSS Percentile 1.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2025-10-09

Classification

CWE
CWE-250
Status draft

Timeline

Published Jun 19, 2025
Tracked Since Feb 18, 2026