logo

CVE-2025-22242 salt

Package

Manager: pip
Name: salt
Vulnerable Version: >=3007.0rc1 <3007.4 || >=3006.0rc1 <3006.12

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00028 pctl0.06237

Details

Salt's worker process vulnerable to denial of service through file read operation Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.

Metadata

Created: 2025-06-13T09:30:34Z
Modified: 2025-06-13T21:57:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-989c-m532-p2hv/GHSA-989c-m532-p2hv.json
CWE IDs: ["CWE-770"]
Alternative ID: GHSA-989c-m532-p2hv
Finding: F067
Auto approve: 1