CVE-2021-25281

CRITICAL EXPLOITED NUCLEI

SaltStack Salt <3002.5 - RCE

Title source: llm

Description

An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.

Exploits (3)

nomisec WORKING POC 27 stars
by Immersive-Labs-Sec · poc
https://github.com/Immersive-Labs-Sec/CVE-2021-25281
metasploit WORKING POC EXCELLENT
by Alex Seymour, Christophe De La Fuente · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/saltstack_salt_wheel_async_rce.rb

Nuclei Templates (1)

SaltStack Salt <3002.5 - Auth Bypass
CRITICALby madrobot

Scores

CVSS v3 9.8
EPSS 0.9385
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2026-01-14
CWE
CWE-287
Status published
Products (8)
debian/debian_linux 9.0
debian/debian_linux 10.0
debian/debian_linux 11.0
fedoraproject/fedora 32
fedoraproject/fedora 33
fedoraproject/fedora 34
pypi/salt 0 - 2015.8.13PyPI
saltstack/salt < 2015.8.10
Published Feb 27, 2021
Tracked Since Feb 18, 2026