CVE-2025-6193
Trustyai-explainability: command injection via lmevaljob cr
CVSS Score
5.9
EPSS Score
0.1%
EPSS Percentile
28th
A command injection vulnerability was discovered in the TrustyAI Explainability toolkit. Arbitrary commands placed in certain fields of a LMEValJob custom resource (CR) may be executed in the LMEvalJob pod's terminal. This issue can be exploited via a maliciously crafted LMEvalJob by a user with permissions to deploy a CR.
| CWE | CWE-78 |
| Published | Jun 20, 2025 |
| Last Updated | Mar 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new medium vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
Red Hat / Red Hat OpenShift AI 2.16
All versions affected Red Hat / Red Hat OpenShift AI (RHOAI)
All versions affected Red Hat / Red Hat OpenShift AI (RHOAI)
All versions affected Red Hat / Red Hat OpenShift AI (RHOAI)
All versions affected Red Hat / Red Hat OpenShift AI (RHOAI)
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2026:5807 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-6193 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2374032 github.com: https://github.com/trustyai-explainability/trustyai-service-operator/pull/504