๐Ÿ” CVE Alert

CVE-2025-2843

HIGH 8.8

Observability-operator: observability operator privilege escalation

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.

CWE CWE-266
Vendor rhobs
Product observability-operator
Published Nov 12, 2025
Last Updated Dec 19, 2025
Stay Ahead of the Next One

Get instant alerts for rhobs observability-operator

Be the first to know when new high vulnerabilities affecting rhobs observability-operator are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

rhobs / observability-operator
0 < 1.3.0
Red Hat / Cluster Observability Operator 1.3.1
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21146 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-2843 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2355222

Credits

Red Hat would like to thank Andong Chen (Lab for Internet and Security Technology) and Zhaoxuan Isaac Jin (Lab for Internet and Security Technology) for reporting this issue.