CVE-2025-27591 Overview
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Critical Impact
Potential for local attackers to gain root privileges
Affected Products
- Facebook Below
Discovery Timeline
- Not Available - Vulnerability discovered by Not Available
- Not Available - Responsible disclosure to Facebook
- Not Available - CVE CVE-2025-27591 assigned
- Not Available - Facebook releases security patch
- 2025-03-11 - CVE CVE-2025-27591 published to NVD
- 2025-07-03 - Last updated in NVD database
Technical Details for CVE-2025-27591
Vulnerability Analysis
This vulnerability arises from improper permissions on a directory (/var/log/below) created by the Below service. It is world-writable, which allows attackers to perform symlink attacks, redirecting the service to manipulate critical system files and potentially escalate privileges.
Root Cause
The creation of a world-writable directory without proper checks or restrictions allows tampering by unauthorized users.
Attack Vector
Local
# Example exploitation code (sanitized)
ln -s /etc/shadow /var/log/below/malicious_link
Detection Methods for CVE-2025-27591
Indicators of Compromise
- Unauthorized changes to /etc/shadow
- Suspicious symlinks in /var/log/below
- Unexpected user accounts with elevated privileges
Detection Strategies
Monitoring for changes in file permissions and symlink creation in the /var/log/below directory can indicate exploitation attempts. File integrity monitoring tools are recommended.
Monitoring Recommendations
Implement continuous monitoring of critical directories and system files for unauthorized access or modifications.
How to Mitigate CVE-2025-27591
Immediate Actions Required
- Restrict permissions on /var/log/below
- Audit existing symlinks and unauthorized access
- Implement proper directory access controls
Patch Information
Apply the patch released by Facebook available at:
Patch Link
Workarounds
If the patch cannot be applied immediately, restrict directory access permissions using chmod:
# Configuration example
chmod 750 /var/log/below
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

