
We found results for “”
CVE-2025-22237
Good to know:


Date: June 13, 2025
An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-77Top Fix

Upgrade Version
Upgrade to version salt - 3006.12;salt - 3007.4;salt - 3006.12;salt - 3007.4;https://github.com/saltstack/salt.git - v3006.12;https://github.com/saltstack/salt.git - v3007.4
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | HIGH |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |