SaltStack In October 2020, VMware acquired SaltStack. SaltStack helps customers to automate ITOps, DevOps, NetOps or SecOps functions.
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any SaltStack product.
RSS Feeds for SaltStack security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in SaltStack products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by SaltStack Sorted by Most Security Vulnerabilities since 2018
Known Exploited SaltStack Vulnerabilities
The following SaltStack vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| SaltStack directory traversal failure to sanitize untrusted input |
The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users. CVE-2020-11652 Exploit Probability: 94.3% |
November 3, 2021 |
| SaltStack Salt Authentication Bypass |
The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. CVE-2020-11651 Exploit Probability: 94.4% |
November 3, 2021 |
| SaltStack Through 3002 Shell Injection Vulnerability |
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. CVE-2020-16846 Exploit Probability: 94.4% |
November 3, 2021 |
Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 0 vulnerabilities in SaltStack. Last year, in 2025 SaltStack had 7 security vulnerabilities published. Right now, SaltStack is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 7 | 7.50 |
| 2024 | 2 | 0.00 |
| 2023 | 3 | 7.63 |
| 2022 | 5 | 7.78 |
| 2021 | 13 | 8.15 |
| 2020 | 6 | 8.98 |
| 2019 | 1 | 9.80 |
| 2018 | 2 | 7.55 |
It may take a day or so for new SaltStack vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent SaltStack Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2024-38824 | Jun 13, 2025 |
Directory Traversal via recv_file Enables Arbitrary File Write to Master CacheDirectory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory. |
|
| CVE-2024-38823 | Jun 13, 2025 |
SaltStack Salt Request Server Replay Attack (No TLS)Salt's request server is vulnerable to replay attacks when not using a TLS encrypted transport. |
|
| CVE-2025-22236 | Jun 13, 2025 |
Salt Minion v>=3007.0 Event Bus Auth BypassMinion event bus authorization bypass. An attacker with access to a minion key can craft a message which may be able to execute a job on other minions (>= 3007.0). |
|
| CVE-2024-38822 | Jun 13, 2025 |
Salt Master Token Validation Bypass Enables Minion ImpersonationMultiple methods in the salt master skip minion token validation. Therefore a misbehaving minion can impersonate another minion. |
|
| CVE-2025-22240 | Jun 13, 2025 |
SaltStack GitFS arbitrary file deletion via unvalidated tgt_env pathArbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the tgt_env variable. This can be exploited by an attacker to delete any file on the Master's process has permissions to. |
|
| CVE-2024-38825 | Jun 13, 2025 |
SaltStack: pki Auth Allows Authentication Without Private KeyThe salt.auth.pki module does not properly authenticate callers. The "password" field contains a public certificate which is validated against a CA certificate by the module. This is not pki authentication, as the caller does not need access to the corresponding private key for the authentication attempt to be accepted. |
|
| CVE-2025-22242 | Jun 13, 2025 |
SaltStack Salt Master pub_ret Untrusted File Read DoSWorker process denial of service through file read operation. .A vulnerability exists in the Master's pub_ret method which is exposed to all minions. The un-sanitized input value jid is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system. |
|
| CVE-2024-22232 | Jun 27, 2024 |
Directory Traversal in Salt File Server Enables Arbitrary File ReadA specially crafted url can be created which leads to a directory traversal in the salt file server. A malicious user can read an arbitrary file from a Salt masters filesystem. |
|
| CVE-2024-22231 | Jun 27, 2024 |
Syndic cache dir traversal leads to arbitrary directory creation on SaltSyndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master. |
|
| CVE-2023-20897 | Sep 05, 2023 |
SaltStack Salt 3005.2/3006.2 DoS via Minion ReturnSalt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted. |
|