CVE-2026-28370

In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This may result in unauthorized access to the host and further compromise of the Vitrage service. All deployments exposing the Vitrage API are affected. This occurs in _create_query_function in vitrage/graph/query.py.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:vitrage:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:vitrage:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:vitrage:*:*:*:*:*:*:*:*
cpe:2.3:a:openstack:vitrage:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-27 05:18

Updated : 2026-03-05 05:16


NVD link : CVE-2026-28370

Mitre link : CVE-2026-28370

CVE.ORG link : CVE-2026-28370


JSON object : View

Products Affected

openstack

  • vitrage
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')