Vulnerability Description
Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://docs.saltproject.io/en/3006/topics/releases/3006.12.html
- https://docs.saltproject.io/en/3007/topics/releases/3007.4.html
FAQ
What is CVE-2025-22242?
CVE-2025-22242 is a vulnerability with a CVSS score of 5.6 (MEDIUM). Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to co...
How severe is CVE-2025-22242?
CVE-2025-22242 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-22242?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.