Severity
5.6MEDIUM
EPSS
0.1%
top 67.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 13

Description

Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:HExploitability: 0.3 | Impact: 5.2

Affected Packages2 packages

PyPIsalt3007.0rc13007.4+1
CVEListV5vmware/salt3006.x3006.12+1

🔴Vulnerability Details

4
CVEList
CVE-2025-22242 salt advisory2025-06-13
OSV
CVE-2025-22242: Worker process denial of service through file read operation2025-06-13
OSV
Salt's worker process vulnerable to denial of service through file read operation2025-06-13
GHSA
Salt's worker process vulnerable to denial of service through file read operation2025-06-13
CVE-2025-22242 (MEDIUM CVSS 5.6) | Worker process denial of service th | cvebase.io