In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via
improperly neutralized inputs used in an SQL command using a well-known token.
improperly neutralized inputs used in an SQL command using a well-known token.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://docs.chef.io/release_notes_automate/#4.13.295 |
![]() ![]() |
History
Mon, 29 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via improperly neutralized inputs used in an SQL command using a well-known token. | |
Title | Chef Automate compliance service SQL Injection Vulnerability | |
Weaknesses | CWE-200 CWE-89 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2025-09-29T11:29:50.463Z
Reserved: 2025-08-11T14:53:51.880Z
Link: CVE-2025-8868

No data.

Status : Received
Published: 2025-09-29T12:15:49.230
Modified: 2025-09-29T12:15:49.230
Link: CVE-2025-8868

No data.

No data.