SaltStack, Authorization Bypass, CVE-2025-XXXXX (High)

Listen to this Post

How the CVE Works

This vulnerability exploits a flaw in SaltStack’s minion event bus authorization mechanism. Attackers with a compromised minion key can craft malicious messages, bypassing access controls. By sending specially designed events, they can trigger unauthorized job execution on other minions. The issue affects Salt versions >= 3007.0 and >= 3006.0, where improper validation allows unauthorized command relay. The event bus fails to verify the sender’s permissions, enabling lateral movement within the Salt infrastructure.

DailyCVE Form

Platform: SaltStack
Version: >= 3007.0, < 3007.4
Vulnerability: Authorization bypass
Severity: High
Date: Jun 13, 2025

Prediction: Patch by Jun 20, 2025

What Undercode Say

Analytics:

salt '' test.ping Check minion responsiveness
salt-run jobs.list_jobs Audit job executions

How Exploit:

import salt.client
client = salt.client.LocalClient()
client.cmd('', 'cmd.run', ['malicious_command']) PoC abuse

Protection from this CVE:

  • Upgrade to 3007.4 or 3006.12
  • Restrict minion key access
  • Monitor event bus traffic

Impact:

  • Unauthorized remote code execution
  • Lateral movement via Salt master
  • Compromise of managed minions

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top