A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validation of command whitelisting.
Metrics
Affected Vendors & Products
References
History
Wed, 05 Nov 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 05 Nov 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validation of command whitelisting. | |
| Title | Foreman: os command injection via ct_location and fcct_location parameters | |
| First Time appeared |
Redhat
Redhat satellite Redhat satellite Capsule Redhat satellite Maintenance Redhat satellite Utils |
|
| Weaknesses | CWE-602 | |
| CPEs | cpe:/a:redhat:satellite:6 cpe:/a:redhat:satellite:6.18::el9 cpe:/a:redhat:satellite_capsule:6.18::el9 cpe:/a:redhat:satellite_maintenance:6.18::el9 cpe:/a:redhat:satellite_utils:6.18::el9 |
|
| Vendors & Products |
Redhat
Redhat satellite Redhat satellite Capsule Redhat satellite Maintenance Redhat satellite Utils |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-11-05T07:32:14.390Z
Updated: 2025-11-05T14:10:17.004Z
Reserved: 2025-09-17T11:48:59.825Z
Link: CVE-2025-10622
Updated: 2025-11-05T14:10:13.367Z
Status : Received
Published: 2025-11-05T08:15:32.990
Modified: 2025-11-05T08:15:32.990
Link: CVE-2025-10622