Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18253 | Salt's on demand pillar functionality vulnerable to arbitrary command injections |
Github GHSA |
GHSA-fcr4-h6c4-rvvp | Salt's on demand pillar functionality vulnerable to arbitrary command injections |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 13 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
ssvc
|
Fri, 13 Jun 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process. | |
| Title | CVE-2025-22237 salt advisory | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-02-26T17:50:38.381Z
Reserved: 2025-01-02T04:30:06.833Z
Link: CVE-2025-22237
Updated: 2025-06-13T13:52:54.401Z
Status : Deferred
Published: 2025-06-13T07:15:21.010
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-22237
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA