A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.
References
| Link | Resource |
|---|---|
| https://portal.perforce.com/s/detail/a91PA000001SiDdYAK | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Oct 2025, 17:00
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Puppet puppet Enterprise
Puppet |
|
| CPE | cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2025.3.0:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | () https://portal.perforce.com/s/detail/a91PA000001SiDdYAK - Third Party Advisory |
26 Jun 2025, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Jun 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-26 07:15
Updated : 2025-10-14 17:00
NVD link : CVE-2025-5459
Mitre link : CVE-2025-5459
CVE.ORG link : CVE-2025-5459
JSON object : View
Products Affected
puppet
- puppet_enterprise
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
