Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-6568 | Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication. |
Wed, 06 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 Aug 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lxcenter
Lxcenter kloxo |
|
| Vendors & Products |
Lxcenter
Lxcenter kloxo |
Fri, 01 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication. | |
| Title | Kloxo <= 6.1.12 Local Privilege Escalation | |
| Weaknesses | CWE-269 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T11:13:51.440Z
Reserved: 2025-08-01T16:20:30.826Z
Link: CVE-2012-10022
Updated: 2025-08-06T13:58:19.936Z
Status : Deferred
Published: 2025-08-01T21:15:25.773
Modified: 2026-04-15T00:35:42.020
Link: CVE-2012-10022
No data.
OpenCVE Enrichment
Updated: 2025-08-04T08:49:31Z
EUVD