CVE-2021-25281
CRITICAL EXPLOITED NUCLEISaltStack Salt <3002.5 - RCE
Title source: llmDescription
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
Exploits (3)
nomisec
WORKING POC
27 stars
by Immersive-Labs-Sec · poc
https://github.com/Immersive-Labs-Sec/CVE-2021-25281
metasploit
WORKING POC
EXCELLENT
by Alex Seymour, Christophe De La Fuente · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/saltstack_salt_wheel_async_rce.rb
Nuclei Templates (1)
SaltStack Salt <3002.5 - Auth Bypass
CRITICALby madrobot
References (11)
Scores
CVSS v3
9.8
EPSS
0.9385
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2026-01-14
CWE
CWE-287
Status
published
Products (8)
debian/debian_linux
9.0
debian/debian_linux
10.0
debian/debian_linux
11.0
fedoraproject/fedora
32
fedoraproject/fedora
33
fedoraproject/fedora
34
pypi/salt
0 - 2015.8.13PyPI
saltstack/salt
< 2015.8.10
Published
Feb 27, 2021
Tracked Since
Feb 18, 2026