Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
History

Fri, 30 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
Title Salt junos module uses an unsafe YAML loader which may allow unintended code execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-01-30T19:30:20.366Z

Reserved: 2025-10-10T10:06:33.841Z

Link: CVE-2025-62348

cve-icon Vulnrichment

Updated: 2026-01-30T19:30:17.029Z

cve-icon NVD

Status : Received

Published: 2026-01-30T19:16:10.860

Modified: 2026-01-30T19:16:10.860

Link: CVE-2025-62348

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.