Sudo's host (-h or --host) option is intended to be used in conjunction with the list option (-l or --list) to list a user's sudo privileges on a host other than the current one. However, due to a bug it was not restricted to listing privileges and could be used when running a command via `sudo` or editing a file with sudoedit. Depending on the rules present in the sudoers file this could allow a local privilege escalation attack.
Sudo versions affected: Sudo versions 1.8.8 to 1.9.17 inclusive are affected. CVE ID: This vulnerability has been assigned CVE-2025-32462 in the Common Vulnerabilities and Exposures database. Details: The intent of sudo's -h (--host) option is to make it possible to list a user's sudo privileges for a host other than the current one. It was only intended be used with in conjunction with the -l (--list) option. The bug effectively makes the hostname portion of a sudoers rule irrelevant since the user can set the host to be used when evaluating the rules themselves. A user must still be listed in the sudoers file, but they do not needed to have an entry for the current host. For example, given the sudoers rule: alice cerebus = ALL user alice would be able to run "sudo -h cerebus id" on any host, not just cerebus. For example: alice@hades$ sudo -l Sorry, user alice may not run sudo on hades. alice@hades$ sudo -l -h cerebus User alice may run the following commands on cerebus: (root) ALL alice@hades$ sudo -h cerebus id uid=0(root) gid=0(root) groups=0(root) Impact: Sudoers files that include rules where the host field is not the current host or "ALL" are affected. This primarily affects sites that use a common sudoers file that is distributed to multiple machines. Sites that use LDAP-based sudoers (including SSSD) are similarly impacted. For example, a sudoers rule such as: bob ALL = ALL is not affected since the host "ALL" already matches any hosts, but a rule like: alice cerebus = ALL could allow user alice to run any command even if the current host is not cerebus. Fix: The bug is fixed in sudo 1.9.17p1. Credit: Thanks to Rich Mirch from Stratascale Cyber Research Unit (CRU) for reporting and analyzing the bug. The Stratascale advisory can be found at: https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host