Home

Description

In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This may result in unauthorized access to the host and further compromise of the Vitrage service. All deployments exposing the Vitrage API are affected. This occurs in _create_query_function in vitrage/graph/query.py.

PUBLISHED Reserved 2026-02-27 | Published 2026-02-27 | Updated 2026-02-27 | Assigner mitre




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Product status

Default status
unknown

Any version before 12.0.1
affected

13.0.0 (semver)
affected

14.0.0 (semver)
affected

15.0.0 (semver)
affected

References

storyboard.openstack.org/

github.com/...40f9cd9b7e9dbab7d02af51/vitrage/graph/query.py

cve.org (CVE-2026-28370)

nvd.nist.gov (CVE-2026-28370)

Download JSON