In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via
improperly neutralized inputs used in an SQL command using a well-known token.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://docs.chef.io/release_notes_automate/#4.13.295 |
|
History
Thu, 16 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux linux Kernel
|
|
| CPEs | cpe:2.3:a:chef:automate:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Linux linux Kernel
|
Tue, 30 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chef
Chef automate Chef chef Linux Linux linux |
|
| Vendors & Products |
Chef
Chef automate Chef chef Linux Linux linux |
Mon, 29 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via improperly neutralized inputs used in an SQL command using a well-known token. | |
| Title | Chef Automate compliance service SQL Injection Vulnerability | |
| Weaknesses | CWE-200 CWE-89 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published: 2025-09-29T11:29:50.463Z
Updated: 2025-09-29T12:55:02.884Z
Reserved: 2025-08-11T14:53:51.880Z
Link: CVE-2025-8868
Updated: 2025-09-29T12:54:58.851Z
Status : Analyzed
Published: 2025-09-29T12:15:49.230
Modified: 2025-10-16T17:14:27.610
Link: CVE-2025-8868
No data.