Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22237: Vulnerability in VMware SALT

0
Medium
VulnerabilityCVE-2025-22237cvecve-2025-22237
Published: Fri Jun 13 2025 (06/13/2025, 06:55:39 UTC)
Source: CVE Database V5
Vendor/Project: VMware
Product: SALT

Description

An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:49:28 UTC

Technical Analysis

CVE-2025-22237 is a command injection vulnerability in VMware SALT versions 3006.x and 3007.x, specifically within the 'on demand' pillar functionality. The vulnerability arises when an attacker possessing a valid minion key crafts a malicious git URL that is processed by the master server. Due to insufficient sanitization of this input, the attacker can execute arbitrary commands on the master with the same privileges as the master process. This vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command). The attack vector is local (AV:L), requiring the attacker to have high privileges (PR:H) via possession of a minion key, but no user interaction is needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflected in a CVSS 3.1 base score of 6.7 (medium severity). No patches or exploits are currently publicly available, but the vulnerability poses a significant risk due to the elevated privileges of the master process. The vulnerability was reserved in early 2025 and published in June 2025. The master server, which orchestrates configuration management and automation, is critical infrastructure in many organizations, making this vulnerability particularly concerning if exploited.

Potential Impact

If exploited, this vulnerability allows an attacker with a minion key to execute arbitrary commands on the VMware SALT master server with full privileges. This can lead to complete compromise of the master server, resulting in unauthorized access to sensitive configuration data, disruption of automation workflows, and potential lateral movement within the network. The attacker could manipulate or disrupt critical infrastructure managed by SALT, causing operational downtime or data breaches. Given the master server’s central role, the impact extends beyond a single system, potentially affecting multiple managed nodes and services. The requirement for a minion key limits the attack surface but does not eliminate risk, especially in environments where key management is weak or compromised. Organizations relying heavily on VMware SALT for configuration management and automation are at risk of significant operational and security impacts.

Mitigation Recommendations

Organizations should immediately audit and restrict access to minion keys, ensuring they are only available to trusted entities and rotated regularly. Implement strict access controls and monitoring around the SALT master and minion key usage. Disable or restrict the 'on demand' pillar functionality if not required. Monitor logs for unusual git URL usage or unexpected command executions on the master server. VMware should be engaged to provide patches or updates; until then, consider isolating the SALT master server in a segmented network zone to limit exposure. Employ defense-in-depth strategies such as host-based intrusion detection systems (HIDS) and endpoint protection on the master server. Conduct regular security assessments and penetration testing focused on SALT deployments. Finally, educate administrators on secure key management and the risks associated with elevated privileges in automation tools.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2025-01-02T04:30:06.833Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684bcd89a8c9212743802748

Added to database: 6/13/2025, 7:04:41 AM

Last enriched: 2/27/2026, 12:49:28 AM

Last updated: 3/24/2026, 11:44:56 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses