{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T16:43:51.260","vulnerabilities":[{"cve":{"id":"CVE-2025-22242","sourceIdentifier":"security@vmware.com","published":"2025-06-13T07:15:21.710","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system."},{"lang":"es","value":"Denegación de servicio del proceso de trabajo mediante la operación de lectura de archivos. Existe una vulnerabilidad en el método \"pub_ret\" del maestro, que está expuesta a todos los minions. El valor de entrada \"jid\", sin depurar, se utiliza para construir una ruta que posteriormente se abre para lectura. Un atacante podría explotar esta vulnerabilidad intentando leer un nombre de archivo que no devuelva datos, por ejemplo, atacando un nodo de canalización en el sistema de archivos proc."}],"metrics":{"cvssMetricV31":[{"source":"security@vmware.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":0.3,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"references":[{"url":"https://docs.saltproject.io/en/3006/topics/releases/3006.12.html","source":"security@vmware.com"},{"url":"https://docs.saltproject.io/en/3007/topics/releases/3007.4.html","source":"security@vmware.com"}]}}]}