{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5459","assignerOrgId":"ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e","state":"PUBLISHED","assignerShortName":"Perforce","dateReserved":"2025-06-02T09:29:25.872Z","datePublished":"2025-06-26T06:30:56.546Z","dateUpdated":"2025-07-03T09:25:04.719Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Puppet Enterprise","vendor":"Perforce","versions":[{"lessThanOrEqual":"2023.8.3, 2025.3","status":"affected","version":"2018.1.8","versionType":"custom"}]}],"credits":[{"lang":"en","type":"reporter","value":"TIM Security Red Team Research - https://www.gruppotim.it/it/footer/red-team.html"},{"lang":"en","type":"finder","value":"Marco Ventura"},{"lang":"en","type":"finder","value":"Claudia Bartolini"},{"lang":"en","type":"finder","value":"Andrea Carlo Maria Dattola"},{"lang":"en","type":"finder","value":"Stefano Carbè"},{"lang":"en","type":"finder","value":"Massimiliano Brolli"}],"datePublic":"2025-06-25T18:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0."}],"value":"A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.6,"baseSeverity":"HIGH","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"ca2a266c-be2f-4d4b-92d0-47b76b1a9c4e","shortName":"Perforce","dateUpdated":"2025-07-03T09:25:04.719Z"},"references":[{"url":"https://portal.perforce.com/s/detail/a91PA000001SiDdYAK"}],"source":{"discovery":"UNKNOWN"},"title":"OS Command Injection","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-26T13:30:51.791004Z","id":"CVE-2025-5459","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-26T13:31:04.769Z"}}]}}