Untriaged
Permalink
CVE-2025-10622
8.0 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Foreman: os command injection via ct_location and fcct_location parameters
A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validation of command whitelisting.
References
Affected products
foreman
- *
- <3.16.1
satellite:el8/foreman
Matching in nixpkgs
pkgs.foreman
Process manager for applications with multiple components
pkgs.emacsPackages.foreman-mode
None
-
nixos-unstable 20170725.1422
- nixpkgs-unstable 20170725.1422
- nixos-unstable-small 20170725.1422
Package maintainers
-
@zimbatm zimbatm <zimbatm@zimbatm.com>