CVE-2025-22241 – salt
Package
Manager: pip
Name: salt
Vulnerable Version: >=3007.0rc1 <3007.4 || >=3006.0rc1 <3006.12
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00057 pctl0.17938
Details
Salt's file contents overwrite the VirtKey class File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a specific location and is present in the default configuration.
Metadata
Created: 2025-06-13T09:30:33Z
Modified: 2025-06-17T20:00:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-7f3f-x5f5-79gw/GHSA-7f3f-x5f5-79gw.json
CWE IDs: ["CWE-22", "CWE-73"]
Alternative ID: GHSA-7f3f-x5f5-79gw
Finding: F063
Auto approve: 1