CVE-2025-8868

In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via improperly neutralized inputs used in an SQL command using a well-known token.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:chef:automate:*:*:*:*:*:*:*:*
cpe:2.3:a:chef:automate:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

16 Oct 2025, 17:14

Type Values Removed Values Added
References () https://docs.chef.io/release_notes_automate/#4.13.295 - () https://docs.chef.io/release_notes_automate/#4.13.295 - Patch
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:a:chef:automate:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Chef automate
Chef
Linux

29 Sep 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-29 12:15

Updated : 2025-10-16 17:14


NVD link : CVE-2025-8868

Mitre link : CVE-2025-8868

CVE.ORG link : CVE-2025-8868


JSON object : View

Products Affected

linux

  • linux_kernel

chef

  • automate
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor