CVE-2025-22237Command Injection in Vmware Salt

CWE-77Command Injection5 documents4 sources
Severity
6.7MEDIUMNVD
EPSS
0.1%
top 65.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 13

Description

An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5vmware/salt3006.x3006.12+1
PyPIsaltstack/salt3006.0rc13006.12+1

🔴Vulnerability Details

4
GHSA
Salt's on demand pillar functionality vulnerable to arbitrary command injections2025-06-13
CVEList
CVE-2025-22237 salt advisory2025-06-13
OSV
Salt's on demand pillar functionality vulnerable to arbitrary command injections2025-06-13
OSV
CVE-2025-22237: An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitr2025-06-13
CVE-2025-22237 — Command Injection in Vmware Salt | cvebase