Cyber Posture

CVE-2025-12548

Critical

Published: 13 January 2026

Published
13 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.4368 97.5th percentile
Risk Priority 44 60% EPSS · 20% KEV · 20% CVSS

Description

A flaw was found in Eclipse Che che-machine-exec. This vulnerability allows unauthenticated remote arbitrary command execution and secret exfiltration (SSH keys, tokens, etc.) from other users' Developer Workspace containers, via an unauthenticated JSON-RPC / websocket API exposed on TCP port…

more

3333.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the authentication flaw in che-machine-exec by applying vendor patches such as Red Hat errata RHSA-2025:22620.

prevent

Monitors and controls communications at external interfaces to block unauthorized network access to the exposed TCP port 3333 JSON-RPC/WebSocket API.

prevent

Enforces approved access authorizations to prevent unauthenticated remote command execution and secret exfiltration from Developer Workspace containers.

Security SummaryAI

CVE-2025-12548 is a vulnerability in the Eclipse Che che-machine-exec component, enabling unauthenticated remote arbitrary command execution and secret exfiltration, including SSH keys and tokens, from other users' Developer Workspace containers. The issue stems from an unauthenticated JSON-RPC/WebSocket API exposed on TCP port 3333. It is associated with CWE-306 (Missing Authentication for Critical Function) and carries a CVSS v3.1 base score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H). The vulnerability was published on 2026-01-13.

The attack requires low privileges (PR:L), is network-accessible with low complexity and user interaction, and changes scope upon exploitation. An attacker can achieve high-impact confidentiality, integrity, and availability effects by executing arbitrary commands and exfiltrating sensitive data from other users' workspaces via the exposed API.

Red Hat has issued patches via errata RHSA-2025:22620, RHSA-2025:22623, and RHSA-2025:22652. Further details on the vulnerability and mitigation are available in the Red Hat security advisory at https://access.redhat.com/security/cve/CVE-2025-12548 and Bugzilla entry https://bugzilla.redhat.com/show_bug.cgi?id=2408850.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
T1552.004 Private Keys Credential Access
Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials.
Why these techniques?

Vulnerability enables remote exploitation of a service for arbitrary Unix shell command execution (T1210, T1059.004) and direct exfiltration of credentials in files including private SSH keys and tokens (T1552.001, T1552.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References