In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via
improperly neutralized inputs used in an SQL command using a well-known token.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://docs.chef.io/release_notes_automate/#4.13.295 |
![]() ![]() |
History
Tue, 30 Sep 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Chef
Chef automate Chef chef Linux Linux linux |
|
Vendors & Products |
Chef
Chef automate Chef chef Linux Linux linux |
Mon, 29 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via improperly neutralized inputs used in an SQL command using a well-known token. | |
Title | Chef Automate compliance service SQL Injection Vulnerability | |
Weaknesses | CWE-200 CWE-89 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2025-09-29T12:55:02.884Z
Reserved: 2025-08-11T14:53:51.880Z
Link: CVE-2025-8868

Updated: 2025-09-29T12:54:58.851Z

Status : Awaiting Analysis
Published: 2025-09-29T12:15:49.230
Modified: 2025-09-29T19:34:10.030
Link: CVE-2025-8868

No data.