A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.
References
| Link | Resource |
|---|---|
| https://portal.perforce.com/s/detail/a91PA000001SiDdYAK | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Oct 2025, 17:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://portal.perforce.com/s/detail/a91PA000001SiDdYAKÂ - Third Party Advisory | |
| CPE | cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:* cpe:2.3:a:puppet:puppet_enterprise:2025.3.0:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Puppet
Puppet puppet Enterprise |
26 Jun 2025, 18:57
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-26 07:15
Updated : 2025-10-14 17:00
NVD link : CVE-2025-5459
Mitre link : CVE-2025-5459
CVE.ORG link : CVE-2025-5459
JSON object : View
Products Affected
puppet
- puppet_enterprise
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
