conda-forge-webservices is the web app deployed to run conda-forge admin commands and linting. Prior to version 2025.3.24, the conda_forge_webservice Docker container executes commands without specifying a user. By default, Docker containers run as the root user, which increases the risk of privilege escalation and host compromise if a vulnerability is exploited. This issue has been patched in version 2025.3.24.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 17 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 17 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | conda-forge-webservices is the web app deployed to run conda-forge admin commands and linting. Prior to version 2025.3.24, the conda_forge_webservice Docker container executes commands without specifying a user. By default, Docker containers run as the root user, which increases the risk of privilege escalation and host compromise if a vulnerability is exploited. This issue has been patched in version 2025.3.24. | |
| Title | conda-forge-webservices Privilege Escalation Risk via Default Docker Root User | |
| Weaknesses | CWE-276 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-17T14:02:37.266Z
Updated: 2025-06-17T18:15:47.781Z
Reserved: 2025-06-11T14:33:57.800Z
Link: CVE-2025-49842
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-06-17T14:18:09.282Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-06-17T14:15:32.170
Modified: 2025-06-17T20:50:23.507
Link: CVE-2025-49842
 Redhat
                        Redhat
                    No data.