nomisec
WORKING POC
65 stars
by guinea-offensive-security · local
https://github.com/guinea-offensive-security/CVE-2025-6019
This repository contains a functional PoC for CVE-2025-6019, a local privilege escalation (LPE) vulnerability in `libblockdev` and `udisks`. The exploit creates an XFS filesystem image with an SUID `bash` binary and leverages the vulnerability to mount it without the `nosuid` option, granting a root shell.
Classification
Working Poc 95%
Target:
libblockdev and udisks (specific vulnerable versions unknown)
No auth needed
Prerequisites:
Root access for local mode to create the XFS image · Vulnerable versions of `udisks2` and `libblockdev` on the target system · Dependencies: `dd`, `mkfs.xfs`, `mount`, `umount`, `udisksctl`, `gdbus`, `killall`, `grep`, `chmod`, `cp`
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-6019
This repository contains a functional exploit for CVE-2025-6019, a TOCTOU race condition in udisks2 that allows local privilege escalation via XFS filesystem resizing. The exploit includes scripts to bypass Polkit restrictions, create a weaponized XFS image with a SUID binary, and trigger the race condition via D-Bus requests.
Classification
Working Poc 95%
Target:
udisks2 (with D-Bus access enabled)
Auth required
Prerequisites:
udisks2 with D-Bus access · xfsprogs installed · local user access
github
WORKING POC
9 stars
by MichaelVenturella · shelllocal
https://github.com/MichaelVenturella/CVE-2025-6018-6019-PoC
This repository contains a functional exploit PoC that chains CVE-2025-6018 (PAM/Polkit Active Session Bypass) and CVE-2025-6019 (libblockdev SUID Mount Flaw) to achieve local privilege escalation to root on vulnerable Linux systems. The exploit involves creating a malicious XFS image with a SUID root shell, bypassing authentication via a misconfigured PAM/Polkit session, and triggering a race condition to execute the SUID payload.
Classification
Working Poc 95%
Target:
Linux systems with vulnerable PAM/Polkit and libblockdev configurations
Auth required
Prerequisites:
Access to a vulnerable Linux system · Ability to upload files to the target system · SSH access to the target system
github
WORKING POC
9 stars
by muyuanlove · shellpoc
https://github.com/muyuanlove/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit
This repository contains a functional privilege escalation exploit for CVE-2025-6018 and CVE-2025-6019, leveraging PAM environment manipulation and XFS filesystem operations to achieve root access. The exploit involves creating a malicious XFS image, uploading it to the target, and executing a script that triggers a race condition to escalate privileges.
Classification
Working Poc 95%
Target:
Linux systems with vulnerable PAM and UDisks2 configurations
Auth required
Prerequisites:
Access to a user account with SSH access · Ability to upload files to the target system · PAM configuration manipulation · XFS filesystem tools
github
WORKING POC
6 stars
by dreysanox · pythonremote-auth
https://github.com/dreysanox/CVE-2025-6018_Poc
This PoC automates SSH exploitation of CVE-2025-6018 by poisoning PAM environment variables to achieve privilege escalation. It checks for vulnerable PAM configurations, manipulates environment variables, and validates the exploit by checking for elevated session permissions.
Classification
Working Poc 95%
Target:
PAM (Pluggable Authentication Modules) version 1.3.0
Auth required
Prerequisites:
SSH access to the target system · Valid credentials (password or key-based authentication) · Vulnerable PAM configuration with pam_env.so
nomisec
WORKING POC
4 stars
by And-oss · local
https://github.com/And-oss/CVE-2025-6019-exploit
This repository contains a functional privilege escalation exploit for CVE-2025-6019, targeting a race condition in UDisks2's filesystem resize functionality. The exploit creates a malicious XFS image with a SUID-root shell and triggers the vulnerability via DBus to gain root access.
Classification
Working Poc 95%
Target:
udisks2 (specific vulnerable versions not specified)
Auth required
Prerequisites:
Local access to a vulnerable Linux system · Active logind session (Active=yes, Remote=no) · Ability to create loop devices · udisks2 with vulnerable filesystem resize implementation
github
WORKING POC
3 stars
by 0rionCollector · shelllocal
https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019
This repository contains a functional exploit chain combining CVE-2025-6018 (PAM environment injection) and CVE-2025-6019 (UDisks2 privilege escalation) to achieve local privilege escalation to root on openSUSE Leap 15.x systems. The exploit involves creating an XFS image with a SUID bash binary, injecting malicious environment variables via PAM, and leveraging UDisks2 to execute arbitrary commands with elevated privileges.
Classification
Working Poc 95%
Target:
openSUSE Leap 15.x / SUSE systems (PAM, UDisks2)
Auth required
Prerequisites:
Root access on attacker machine to create XFS image · Local user access on target system · Target system running vulnerable versions of PAM and UDisks2
nomisec
WORKING POC
3 stars
by neko205-mx · local
https://github.com/neko205-mx/CVE-2025-6019_Exploit
This exploit leverages CVE-2025-6019 to achieve local privilege escalation (LPE) by manipulating UDisks2's filesystem resize functionality on a crafted XFS image containing a SUID shell. The PoC demonstrates successful elevation to root via a malicious loop device mount.
Classification
Working Poc 95%
Target:
UDisks2 (specific version not specified)
No auth needed
Prerequisites:
Linux system with UDisks2 vulnerable to CVE-2025-6019 · Ability to execute scripts as a non-root user · Presence of `gdbus`, `udisksctl`, and XFS tools
nomisec
WORKING POC
1 stars
by boboaung1337 · local
https://github.com/boboaung1337/CVE-2025-6019
This PoC exploits CVE-2025-6019, a local privilege escalation vulnerability in libblockdev/udisks, by creating a malicious XFS image with a SUID bash binary and triggering a mount via filesystem resize operations.
Classification
Working Poc 95%
Target:
libblockdev/udisks (specific vulnerable versions unknown)
Auth required
Prerequisites:
root access to create XFS image · udisks2 installed on target · vulnerable libblockdev/udisks version
nomisec
WORKING POC
1 stars
by JM00NJ · local
https://github.com/JM00NJ/CVE-2025-6019-udisks2-XFS-Resize-TOCTOU-Privilege-Escalation
This repository contains a functional PoC for CVE-2025-6019, exploiting a TOCTOU race condition in udisks2 to achieve local privilege escalation via XFS filesystem resizing. The exploit involves bypassing Polkit restrictions, creating a weaponized XFS image with a SUID binary, and triggering the race condition via D-Bus requests.
Classification
Working Poc 95%
Target:
udisks2 (with D-Bus access enabled) and xfsprogs
Auth required
Prerequisites:
Local user access · udisks2 with D-Bus access · xfsprogs installed · Ability to modify ~/.pam_environment
github
WORKING POC
1 stars
by Goultarde · shellremote-auth
https://github.com/Goultarde/CVE-2025-6018_CVE-2025-6019_autopwn
This repository contains a functional exploit chain targeting CVE-2025-6018 (PAM environment injection) and CVE-2025-6019 (privilege escalation via UDisks2) on openSUSE Leap 15.x/SUSE systems. The exploit automates the creation of a malicious XFS image, PAM environment poisoning, and remote execution to achieve root access.
Classification
Working Poc 95%
Target:
openSUSE Leap 15.x / SUSE systems
Auth required
Prerequisites:
Python 3 · paramiko library · sudo access on attacker machine · valid SSH credentials for target
github
SUSPICIOUS
1 stars
by AzureADTrent · poc
https://github.com/AzureADTrent/CVE-2025-6018-and-CVE-2025-6019-Privilege-Escalation
The repository provides vague instructions for exploiting CVE-2025-6018 and CVE-2025-6019 but lacks actual exploit code, instead pointing to external GitHub repositories. It reads like a sales pitch with no technical depth or analysis.
Classification
Suspicious 90%
Target:
Azure AD (specific version unclear)
Auth required
Prerequisites:
Access to attacker machine · Ability to transfer files to victim · Sudo privileges on attacker machine
github
WORKING POC
1 stars
by localh0ste · poc
https://github.com/localh0ste/CVE-2025-6018-and-CVE-2025-6019
This repository contains a functional exploit chain for CVE-2025-6018 and CVE-2025-6019, leveraging PAM environment variable manipulation to impersonate a local user and then abusing XFS resize operations in libblockdev to achieve root access.
Classification
Working Poc 95%
Target:
Linux PAM (1.3.0-1.6.0) and libblockdev/udisks
Auth required
Prerequisites:
SSH access to the target system · Vulnerable PAM version installed · udisks and libblockdev present
github
WORKING POC
1 stars
by DesertDemons · shellpoc
https://github.com/DesertDemons/CVE-2025-6018-6019
This repository contains a functional exploit for CVE-2025-6018 and CVE-2025-6019, which chain together to achieve local privilege escalation (LPE) on openSUSE and SUSE Linux Enterprise 15 systems. The exploit leverages PAM environment variable injection to bypass polkit restrictions and a race condition in udisks2/libblockdev during XFS filesystem resizing to gain root access.
Classification
Working Poc 95%
Target:
openSUSE Leap 15.x, SUSE Linux Enterprise Server (SLES) 15 SP1-SP6, SUSE Linux Enterprise Desktop (SLED) 15 SP1-SP6
Auth required
Prerequisites:
Unprivileged user access on the target system · PAM configured with user_readenv=1 · udisks2 with libblockdev installed · polkit with allow_active: yes for udisks2 actions
nomisec
WRITEUP
by robbin0919 · local
https://github.com/robbin0919/CVE-2025-6019
CVE-2025-6019 is a local privilege escalation (LPE) vulnerability in libblockdev, where an attacker with allow_active Polkit permissions can exploit udisks2 to mount a malicious XFS image without nosuid/nodev flags, leading to root access via a SUID-root shell.
Classification
Writeup 90%
Target:
libblockdev with udisks2 and Polkit
Auth required
Prerequisites:
Local access with allow_active Polkit permissions · Ability to transfer a malicious XFS image to the target system
nomisec
WORKING POC
by harshitvarma05 · local
https://github.com/harshitvarma05/CVE-2025-6019
This PoC exploits CVE-2025-6019, a local privilege escalation vulnerability in libblockdev/udisks. It creates a malicious XFS image with a SUID bash binary, transfers it to the target, and triggers the vulnerability via filesystem resize operations to gain root access.
Classification
Working Poc 90%
Target:
libblockdev/udisks (specific version not specified)
No auth needed
Prerequisites:
Root access to create the XFS image · Target system with vulnerable libblockdev/udisks · Ability to transfer the image to the target
github
WORKING POC
by MaxKappa · shelllocal
https://github.com/MaxKappa/opensuse-leap-privesc-exploit
This repository contains a functional exploit chain for CVE-2025-6018 and CVE-2025-6019, targeting openSUSE Leap 15.6 to achieve local privilege escalation from an unprivileged user to root. The exploit leverages PAM misconfiguration and UDisks2/libblockdev vulnerabilities, requiring a pre-created XFS image with a SUID bash binary.
Classification
Working Poc 95%
Target:
openSUSE Leap 15.6 (PAM, UDisks2, libblockdev)
Auth required
Prerequisites:
openSUSE Leap 15.6 target · XFS image with SUID bash binary · SSH or local shell access as unprivileged user
github
WORKING POC
by matesz44 · shelllocal
https://github.com/matesz44/CVE-2025-6018-19
This script exploits CVE-2025-6018 and CVE-2025-6019 to achieve local privilege escalation (LPE) on SUSE 15 systems. It leverages PAM environment variable manipulation and a vulnerability in libblockdev via udisks to escalate from unprivileged user to root.
Classification
Working Poc 95%
Target:
SUSE 15 with PAM and udisks/libblockdev
Auth required
Prerequisites:
Access to a local shell on the target system · xfsprogs installed for image creation · Ability to mount filesystems
nomisec
WORKING POC
by 0x5chltz · local
https://github.com/0x5chltz/CVE-2025-6019
This exploit leverages CVE-2025-6019 to achieve local privilege escalation (LPE) via a vulnerability in the UDisks2 filesystem management system. It manipulates XFS images and uses improperly sanitized environment variables to escalate privileges to root.
Classification
Working Poc 95%
Target:
UDisks2 (version not specified)
Auth required
Prerequisites:
Access to a user account with password '!QAZ2wsx' · UDisks2 service running · Ability to execute scripts on the target system
nomisec
WORKING POC
by symphony2colour · local
https://github.com/symphony2colour/CVE-2025-6019-udisks-lpe-no-image
This PoC exploits CVE-2025-6019 in UDisks2 to achieve local privilege escalation (LPE) by leveraging a logic flaw in filesystem resize operations. It requires prior exploitation of CVE-2025-6018 to gain necessary D-Bus permissions and relies on a pre-existing XFS image to trigger the vulnerability.
Classification
Working Poc 95%
Target:
UDisks2 (specific version not specified, but likely SUSE/openSUSE-based environments)
Auth required
Prerequisites:
CVE-2025-6018 must be exploited first to gain D-Bus permissions · Pre-existing XFS image file · gdbus and udisksctl must be available on the target system
nomisec
WORKING POC
by phamdinhquy2512 · local
https://github.com/phamdinhquy2512/CVE-2025-6019-Exploitation
This repository contains a working proof-of-concept exploit for CVE-2025-6019, a local privilege escalation vulnerability in UDisks2. The exploit leverages a malicious XFS filesystem image with a SUID-root binary to escalate privileges when mounted and executed.
Classification
Working Poc 95%
Target:
UDisks2 (versions 2.8.4-1ubuntu2 and earlier), libblockdev (versions 2.23-2ubuntu3 and earlier)
No auth needed
Prerequisites:
Local access to the target system · UDisks2 and libblockdev in vulnerable versions · Ability to create and mount filesystem images
nomisec
WORKING POC
by HexRazor · local
https://github.com/HexRazor/CVE-2025-6019
This PoC exploits a UDisks2 XFS resize vulnerability (CVE-2025-6019) to achieve local privilege escalation by implanting a SUID rootbash binary in a crafted XFS image. The exploit triggers a resize operation to activate the payload, granting root access.
Classification
Working Poc 95%
Target:
UDisks2 (with XFS filesystem support)
Auth required
Prerequisites:
mkfs.xfs · udisksctl · gdbus · loginctl · sudo access on build host · target-compatible bash binary
vulncheck_xdb
WORKING POC
local
https://github.com/iOxsec/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit
This repository contains a functional privilege escalation exploit for CVE-2025-6018 and CVE-2025-6019, leveraging PAM environment manipulation and XFS filesystem operations to achieve root access. The exploit involves creating a malicious XFS image, uploading it to the target, and executing a script to trigger a race condition.
Classification
Working Poc 95%
Target:
Linux systems with vulnerable PAM and XFS handling
Auth required
Prerequisites:
SSH access to target · ability to upload files · PAM environment manipulation