CVSS VectorNVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Lifecycle Timeline
4DescriptionNVD
Minion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (>= 3007.0).
AnalysisAI
CVE-2025-22236 is an authorization bypass vulnerability in SaltStack Minion's event bus that allows an attacker with valid minion key credentials to craft specially-crafted messages and execute arbitrary jobs on other minions within the same Salt infrastructure. Affecting SaltStack versions 3007.0 and later, this vulnerability has a CVSS score of 8.1 (High) and requires high privileges but can escalate impact across the entire minion network. The vulnerability represents a critical lateral movement and privilege escalation vector in Salt deployments, though exploitation requires pre-existing minion key compromise.
Technical ContextAI
SaltStack's event bus is the core messaging layer that coordinates communication between the Salt master and minions. The vulnerability stems from improper authorization validation (CWE-287: Improper Authentication) in the event bus message handling logic, specifically in versions >= 3007.0. The event bus processes job execution requests, and the authorization bypass allows an attacker holding a valid minion key to forge messages that bypass normal authentication/authorization checks. Rather than validating that a message sender is authorized to execute jobs on target minions, the bus accepts crafted messages from any authenticated minion. This is a broken access control issue where message origin authentication exists but message intent authorization does not. The affected component is libsaltstack/minion/event_bus (or equivalent internal module handling inter-minion communication). CPE notation would be: cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:* (versions 3007.0 and later).
Vendor StatusVendor
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| trusty | needs-triage | - |
| xenial | needs-triage | - |
| bionic | needs-triage | - |
| jammy | needs-triage | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
Debian
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| (unstable) | fixed | (unfixed) | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18254
GHSA-jh7c-xh74-h76f