{"vulnerability": "CVE-2024-25131", "sightings": [{"uuid": "57158981-59fe-423f-bb91-b777e7f57418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25131", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldo62oxcw22r", "content": "", "creation_timestamp": "2024-12-19T15:15:50.413064Z"}, {"uuid": "36868208-569f-4aa2-82f4-3b5d9c143979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25131", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113679923344883938", "content": "", "creation_timestamp": "2024-12-19T14:19:31.427778Z"}, {"uuid": "c1f4aaa1-53e6-4b85-a01e-c6d2354a9ff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25131", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "37a9fc7a-263d-4cc8-ba6f-7b794b3f7507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25131", "type": "seen", "source": "https://t.me/cvedetector/13334", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25131 - OpenShift Dedicated MustGather Custom Defined Resource Privilege Escalation Persistence Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-25131 \nPublished : Dec. 19, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. A non-privileged user on the cluster can create a MustGather object with a specially crafted file and set the most privileged service account to run the job. This can allow a standard developer user to escalate their privileges to a cluster administrator and pivot to the AWS environment. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T17:19:37.000000Z"}, {"uuid": "9167ae56-4303-4655-a91c-bd4bf42cf7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25131", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}]}