CWE-271
Privilege Dropping / Lowering Errors
The product does not drop privileges before passing control of a resource to an actor that does not have those privileges.
CVE-2025-53819 (GCVE-0-2025-53819)
Vulnerability from cvelistv5
Published
2025-07-14 20:42
Modified
2025-07-15 19:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-271 - Privilege Dropping / Lowering Errors
Summary
Nix is a package manager for Linux and other Unix systems. Builds with Nix 2.30.0 on macOS were executed with elevated privileges (root), instead of the build users. The fix was applied to Nix 2.30.1. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/NixOS/nix/security/advisories/GHSA-qc7j-jgf3-qmhg | x_refsource_CONFIRM | |
https://github.com/NixOS/nix/pull/13281 | x_refsource_MISC | |
https://github.com/NixOS/nix/pull/13455 | x_refsource_MISC | |
https://github.com/NixOS/nix/commit/e2ef2cfcbc83ea01308ee64c38a58707ab23dec3 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53819", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-15T13:55:22.262473Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-15T19:50:28.259Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "nix", "vendor": "NixOS", "versions": [ { "status": "affected", "version": "= 2.30.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Nix is a package manager for Linux and other Unix systems. Builds with Nix 2.30.0 on macOS were executed with elevated privileges (root), instead of the build users. The fix was applied to Nix 2.30.1. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-271", "description": "CWE-271: Privilege Dropping / Lowering Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-14T20:42:12.818Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/NixOS/nix/security/advisories/GHSA-qc7j-jgf3-qmhg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/NixOS/nix/security/advisories/GHSA-qc7j-jgf3-qmhg" }, { "name": "https://github.com/NixOS/nix/pull/13281", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/NixOS/nix/pull/13281" }, { "name": "https://github.com/NixOS/nix/pull/13455", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/NixOS/nix/pull/13455" }, { "name": "https://github.com/NixOS/nix/commit/e2ef2cfcbc83ea01308ee64c38a58707ab23dec3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/NixOS/nix/commit/e2ef2cfcbc83ea01308ee64c38a58707ab23dec3" } ], "source": { "advisory": "GHSA-qc7j-jgf3-qmhg", "discovery": "UNKNOWN" }, "title": "Nix\u0027s privilege dropping to build user broke for macOS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-53819", "datePublished": "2025-07-14T20:42:12.818Z", "dateReserved": "2025-07-09T14:14:52.529Z", "dateUpdated": "2025-07-15T19:50:28.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation ID: MIT-46
Phase: Architecture and Design
Strategy: Separation of Privilege
Description:
- Compartmentalize the system to have "safe" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.
- Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.
Mitigation ID: MIT-1
Phases: Architecture and Design, Operation
Description:
- Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
Mitigation ID: MIT-49
Phase: Architecture and Design
Strategy: Separation of Privilege
Description:
- Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.
No CAPEC attack patterns related to this CWE.