A flaw was found in Red Hat Openshift AI Service. The TrustyAI component is granting all service accounts and users on a cluster permissions to get, list, watch any pod in any namespace on the cluster. TrustyAI is creating a role `trustyai-service-operator-lmeval-user-role` and a CRB `trustyai-service-operator-default-lmeval-user-rolebinding` which is being applied to `system:authenticated` making it so that every single user or service account can get a list of pods running in any namespace on the cluster Additionally users can access all `persistentvolumeclaims` and `lmevaljobs`
History

Wed, 29 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 28 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in Red Hat Openshift AI Service. The TrustyAI component is granting all service accounts and users on a cluster permissions to get, list, watch any pod in any namespace on the cluster. TrustyAI is creating a role `trustyai-service-operator-lmeval-user-role` and a CRB `trustyai-service-operator-default-lmeval-user-rolebinding` which is being applied to `system:authenticated` making it so that every single user or service account can get a list of pods running in any namespace on the cluster Additionally users can access all `persistentvolumeclaims` and `lmevaljobs`
Title Openshift-ai: trusty ai grants all authenticated users to list pods in any namespace
First Time appeared Redhat
Redhat openshift Ai
Weaknesses CWE-266
CPEs cpe:/a:redhat:openshift_ai
Vendors & Products Redhat
Redhat openshift Ai
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-10-28T13:31:59.318Z

Updated: 2025-10-28T13:44:28.496Z

Reserved: 2025-10-23T02:55:38.369Z

Link: CVE-2025-12103

cve-icon Vulnrichment

Updated: 2025-10-28T13:44:24.516Z

cve-icon NVD

Status : Received

Published: 2025-10-28T14:15:55.847

Modified: 2025-10-28T14:15:55.847

Link: CVE-2025-12103

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-28T09:00:00Z

Links: CVE-2025-12103 - Bugzilla