In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via
improperly neutralized inputs used in an SQL command using a well-known token.
References
| Link | Resource |
|---|---|
| https://docs.chef.io/release_notes_automate/#4.13.295 | Patch |
Configurations
Configuration 1 (hide)
| AND |
|
History
16 Oct 2025, 17:14
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Chef Chef automate Linux linux Kernel |
|
| CPE | cpe:2.3:a:chef:automate:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
|
| References | () https://docs.chef.io/release_notes_automate/#4.13.295 - Patch |
29 Sep 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-29 12:15
Updated : 2025-10-16 17:14
NVD link : CVE-2025-8868
Mitre link : CVE-2025-8868
CVE.ORG link : CVE-2025-8868
JSON object : View
Products Affected
chef
- automate
linux
- linux_kernel
