Platform
linux
Component
maas
Fixed in
3.3.11
3.4.9
3.5.9
3.6.2
CVE-2025-7044 describes a Privilege Escalation vulnerability within the MAAS (Metal as a Service) platform. This flaw allows an authenticated, but unprivileged, user to escalate their privileges to that of an administrator, effectively gaining full control over the MAAS deployment. The vulnerability affects versions 3.3.0 through 3.8.0 and has been resolved in version 3.8.1.
The impact of CVE-2025-7044 is significant. Successful exploitation allows an attacker to bypass standard authentication and authorization controls, granting them complete administrative access to the MAAS environment. This includes the ability to manage servers, networks, and users, potentially leading to data breaches, system compromise, and denial of service. An attacker could leverage this privilege escalation to deploy malicious software, steal sensitive data, or completely disrupt the MAAS infrastructure. The ability to self-promote to administrator represents a severe security risk, particularly in environments where MAAS is used to manage critical infrastructure.
CVE-2025-7044 was publicly disclosed on December 3, 2025. The vulnerability’s ease of exploitation, combined with the potential for significant impact, warrants careful attention. There is no indication of active exploitation at this time, but the availability of a public CVE increases the likelihood of future attacks. The vulnerability is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
0.04% (13% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-7044 is to upgrade to MAAS version 3.8.1 or later, which contains the fix for this vulnerability. If an immediate upgrade is not feasible, consider implementing temporary workarounds such as restricting access to the user websocket handler or implementing stricter input validation on the server-side. Monitor MAAS logs for suspicious activity related to user updates and websocket requests. After upgrading, confirm the fix by attempting to update a user's role via the websocket interface and verifying that the is_superuser property cannot be modified without proper authentication.
Update MAAS to a version that corrects the input validation vulnerability. Consult the Ubuntu and MAAS release notes for specific upgrade instructions. As a temporary measure, review and harden MAAS API access policies.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-7044 is a vulnerability in MAAS versions 3.3.0–3.8.0 that allows an authenticated user to escalate privileges to administrator, gaining full control. It’s rated HIGH severity (7.7 CVSS).
You are affected if you are running MAAS versions 3.3.0 through 3.8.0. Upgrade to 3.8.1 or later to mitigate the risk.
The recommended fix is to upgrade to MAAS version 3.8.1 or a later version. If an upgrade is not immediately possible, consider temporary workarounds like restricting access to the websocket handler.
There is currently no public information indicating active exploitation of CVE-2025-7044, but the vulnerability is publicly known and should be addressed promptly.
Refer to the official MAAS security advisory for detailed information and updates regarding CVE-2025-7044. Check the Canonical website for the latest advisory.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.