CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “puppet”

54 vulnerabilities found for “puppet”

Page 1 of 3

CVE-2023-5214
MEDIUM6.5

In Puppet Bolt versions prior to 3.27.4, a path to escalate privileges was identified.

puppet / bolt
Adjacent
Published Oct 6, 2023
Page 1 of 3
CVE-2023-5255
MEDIUM4.4

For certificates that utilize the auto-renew feature in Puppet Server, a flaw exists which prevents the certificates from being revoked.

puppet / puppet_enterprise+2
Network
Published Oct 3, 2023
CVE-2023-1894
MEDIUM5.3

A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations.

puppet / puppet_enterprise+2
Network
Published May 4, 2023
CVE-2022-25350
HIGH7.4

All versions of the package puppet-facter are vulnerable to Command Injection via the getFact function due to improper input sanitization.

helecloud / puppet-facter
Local
Published Jan 26, 2023
CVE-2022-3275
HIGH8.4

Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

puppet / puppetlabs-mysql+2
Adjacent
Published Oct 7, 2022
CVE-2022-3276
HIGH8.4

Command injection is possible in the puppetlabs-mysql module prior to version 13.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

puppet / puppetlabs-mysql
Adjacent
Published Oct 7, 2022
CVE-2022-2394
MEDIUM4.1

Puppet Bolt prior to version 3.24.0 will print sensitive parameters when planning a run resulting in them potentially being logged when run programmatically, such as via Puppet Enterprise.

perforce / puppet_bolt
Network
Published Jul 19, 2022
CVE-2021-27023
CRITICAL9.8

A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007

puppet / puppet_agent+6
Network
Published Nov 18, 2021
CVE-2021-27025
MEDIUM6.5

A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.

puppet / puppet+5
Network
Published Nov 18, 2021
CVE-2021-27018
HIGH7.5

The mechanism which performs certificate validation was discovered to have a flaw that resulted in certificates signed by an internal certificate authority to not be properly validated. This issue only affects clients that are configured to utilize Tenable.sc as the vulnerability data source.

puppet / remediate
Network
Published Aug 30, 2021
CVE-2020-7943
HIGH7.5

Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13

puppet / puppet_enterprise+5
Network
Published Mar 11, 2020
CVE-2020-7942
MEDIUM6.5

Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 and 5.5.19 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. Affected software versions: Puppet 6.x prior to 6.13.0 Puppet Agent 6.x prior to 6.13.0 Puppet 5.5.x prior to 5.5.19 Puppet Agent 5.5.x prior to 5.5.19 Resolved in: Puppet 6.13.0 Puppet Agent 6.13.0 Puppet 5.5.19 Puppet Agent 5.5.19

puppet / puppet+3
Network
Published Feb 19, 2020
CVE-2018-11751
MEDIUM5.4

Previous versions of Puppet Agent didn't verify the peer in the SSL connection prior to downloading the CRL. This issue is resolved in Puppet Agent 6.4.0.

puppet / puppet_server
Adjacent
Published Dec 16, 2019
CVE-2015-1855
MEDIUM5.9

verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.

ruby-lang / ruby+18
Network
Published Nov 29, 2019
CVE-2018-6517
HIGH7.5

Prior to version 0.3.0, chloride's use of net-ssh resulted in host fingerprints for previously unknown hosts getting added to the user's known_hosts file without confirmation. In version 0.3.0 this is updated so that the user's known_hosts file is not updated by chloride.

puppet / chloride
Network
Published Mar 21, 2019
CVE-2018-11752
MEDIUM5.5

Previous releases of the Puppet cisco_ios module output SSH session debug information including login credentials to a world readable file on every run. These issues have been resolved in the 0.4.0 release.

puppet / cisco_ios
Local
Published Oct 2, 2018
CVE-2018-11750
MEDIUM6.5

Previous releases of the Puppet cisco_ios module did not validate a host's identity before starting a SSH connection. As of the 0.4.0 release of cisco_ios, host key checking is enabled by default.

puppet / cisco_ios_module
Network
Published Oct 2, 2018
CVE-2018-6512
CRITICAL9.8

The previous version of Puppet Enterprise 2018.1 is vulnerable to unsafe code execution when upgrading pe-razor-server. Affected releases are Puppet Enterprise: 2018.1.x versions prior to 2018.1.1 and razor-server and pe-razor-server prior to 1.9.0.0.

puppet / pe-razor-server+2
Network
Published Jun 11, 2018
CVE-2016-9590
MEDIUM6.5

puppet-swift before versions 8.2.1, 9.4.4 is vulnerable to an information-disclosure in Red Hat OpenStack Platform director's installation of Object Storage (swift). During installation, the Puppet script responsible for deploying the service incorrectly removes and recreates the proxy-server.conf file with world-readable permissions.

openstack / puppet-swift+4
Local
Published Apr 26, 2018
CVE-2016-9599
HIGH7.1

puppet-tripleo before versions 5.5.0, 6.2.0 is vulnerable to an access-control flaw in the IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. If SSL is enabled, a malicious user could use these open ports to gain access to unauthorized resources.

openstack / puppet-tripleo+2
Network
Published Apr 24, 2018