CVE-2025-22237
CVE-2025-22237 salt advisory
CVSS Score
6.7
EPSS Score
0.0%
EPSS Percentile
0th
An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
| Vendor | vmware |
| Product | salt |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Jun 13, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for vmware salt
Be the first to know when new medium vulnerabilities affecting vmware salt are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
VMware / SALT
3006.x < 3006.12 3007.x < 3007.4