Search for vulnerabilities
| Vulnerability ID | VCID-a7cn-eqbq-qyb1 |
| Aliases |
CVE-2011-3871
GHSA-mpmx-gm5v-q789 |
| Summary | Puppet uses predictable filenames, allowing arbitrary file overwrite Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 6.2 |
| Risk | 3.1 |
| Affected and Fixed Packages | Package Details |
| Percentile | 0.12958 |
| EPSS Score | 0.00042 |
| Published At | April 12, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T12:50:38.782112+00:00 | GitLab Importer | Import | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/puppet/CVE-2011-3871.yml | 38.0.0 |