CVE-2025-22237 – salt
Package
Manager: pip
Name: salt
Vulnerable Version: >=3006.0rc1 <3006.12 || >=3007.0rc1 <3007.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00033 pctl0.07932
Details
Salt's on demand pillar functionality vulnerable to arbitrary command injections An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
Metadata
Created: 2025-06-13T09:30:33Z
Modified: 2025-06-13T21:19:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-fcr4-h6c4-rvvp/GHSA-fcr4-h6c4-rvvp.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-fcr4-h6c4-rvvp
Finding: F422
Auto approve: 1