A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.
History

Tue, 14 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Puppet
Puppet puppet Enterprise
CPEs cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:puppet:puppet_enterprise:2025.3.0:*:*:*:*:*:*:*
Vendors & Products Puppet
Puppet puppet Enterprise
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 26 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Jun 2025 06:45:00 +0000

Type Values Removed Values Added
Description A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.
Title OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Perforce

Published:

Updated: 2025-07-03T09:25:04.719Z

Reserved: 2025-06-02T09:29:25.872Z

Link: CVE-2025-5459

cve-icon Vulnrichment

Updated: 2025-06-26T13:30:58.151Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-26T07:15:27.440

Modified: 2025-10-14T17:00:33.327

Link: CVE-2025-5459

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.