CVE-2025-5459

A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.
References
Link Resource
https://portal.perforce.com/s/detail/a91PA000001SiDdYAK Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2025.3.0:*:*:*:*:*:*:*

History

14 Oct 2025, 17:00

Type Values Removed Values Added
References () https://portal.perforce.com/s/detail/a91PA000001SiDdYAK - () https://portal.perforce.com/s/detail/a91PA000001SiDdYAK - Third Party Advisory
CPE cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2025.3.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Puppet
Puppet puppet Enterprise

26 Jun 2025, 18:57

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-26 07:15

Updated : 2025-10-14 17:00


NVD link : CVE-2025-5459

Mitre link : CVE-2025-5459

CVE.ORG link : CVE-2025-5459


JSON object : View

Products Affected

puppet

  • puppet_enterprise
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')