CVE-2025-9572
Authorization Bypass in Foreman GraphQL API Exposes Metadata
Publication date: 2026-02-27
Last updated on: 2026-03-24
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| theforeman | foreman | From 1.22.0 (inc) to 3.16.2 (exc) |
| redhat | enterprise_linux | 9.0 |
| redhat | satellite | 6.15 |
| redhat | satellite | 6.16 |
| redhat | satellite | 6.17 |
| redhat | satellite | 6.18 |
| redhat | satellite_capsule | 6.15 |
| redhat | satellite_capsule | 6.16 |
| redhat | satellite_capsule | 6.17 |
| redhat | satellite_capsule | 6.18 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an authorization flaw in Foreman's GraphQL API. It allows users with low privileges to access metadata that they should not be able to see according to their assigned permissions. The issue arises because, unlike the REST API which enforces access controls properly, the GraphQL endpoint fails to apply the correct filtering, resulting in an authorization bypass.
How can this vulnerability impact me? :
The impact of this vulnerability is that unauthorized users with limited privileges can gain access to sensitive metadata beyond their allowed scope. This could lead to information disclosure, potentially exposing confidential or sensitive data that should be restricted.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know