CVE-2025-22240 – salt
Package
Manager: pip
Name: salt
Vulnerable Version: >=3007.0rc1 <3007.4 || >=3006.0rc1 <3006.12
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0002 pctl0.03657
Details
Salt allows arbitrary directory creation or file deletion Arbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the “tgt_env” variable. This can be exploited by an attacker to delete any file on the Master's process has permissions to.
Metadata
Created: 2025-06-13T09:30:33Z
Modified: 2025-06-13T21:54:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-xh32-3m67-qjgf/GHSA-xh32-3m67-qjgf.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-xh32-3m67-qjgf
Finding: F063
Auto approve: 1