CVE-2025-62348Code Injection in Project Salt

CWE-94Code Injection9 documents5 sources
Severity
7.3HIGHNVD
EPSS
0.0%
top 98.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 30

Description

Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

PyPIsaltstack/salt< 3006.17
CVEListV5salt_project/salt3006.03006.17+1

🔴Vulnerability Details

3
OSV
Salt junos Module Vulnerable to Code Injection via Specially Crafted YAML Payload2026-01-30
GHSA
Salt junos Module Vulnerable to Code Injection via Specially Crafted YAML Payload2026-01-30
OSV
CVE-2025-62348: Salt's junos execution module contained an unsafe YAML decode/load usage2026-01-30

📋Vendor Advisories

1
Juniper
CVE-2025-62348: Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to2026-01-30

🕵️Threat Intelligence

4
Wiz
CVE-2025-67726 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-67725 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-62348 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-67724 Impact, Exploitability, and Mitigation Steps | Wiz