A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.
History

Thu, 26 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Jun 2025 06:45:00 +0000

Type Values Removed Values Added
Description A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.
Title OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Perforce

Published: 2025-06-26T06:30:56.546Z

Updated: 2025-07-03T09:25:04.719Z

Reserved: 2025-06-02T09:29:25.872Z

Link: CVE-2025-5459

cve-icon Vulnrichment

Updated: 2025-06-26T13:30:58.151Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-26T07:15:27.440

Modified: 2025-06-26T18:57:43.670

Link: CVE-2025-5459

cve-icon Redhat

No data.