CVE-2026-28370
Received Received - Intake
Remote Code Execution in OpenStack Vitrage Query Parser

Publication date: 2026-02-27

Last updated on: 2026-03-05

Assigner: MITRE

Description
In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This may result in unauthorized access to the host and further compromise of the Vitrage service. All deployments exposing the Vitrage API are affected. This occurs in _create_query_function in vitrage/graph/query.py.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-27
Last Modified
2026-03-05
Generated
2026-05-07
AI Q&A
2026-02-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
openstack vitrage to 12.01 (exc)
openstack vitrage From 13.0.0 (inc) to 13.0.1 (exc)
openstack vitrage From 14.0.0 (inc) to 14.0.1 (exc)
openstack vitrage From 15.0.0 (inc) to 15.0.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-95 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Can you explain this vulnerability to me?

This vulnerability exists in the query parser of OpenStack Vitrage versions before 12.0.1, 13.0.0, 14.0.0, and 15.0.0. A user who has access to the Vitrage API can exploit this flaw to execute arbitrary code on the host machine where the Vitrage service runs. The code execution happens with the same privileges as the Vitrage service user, potentially allowing unauthorized control over the host system.

The issue occurs specifically in the _create_query_function method within the vitrage/graph/query.py file.

All deployments that expose the Vitrage API are vulnerable to this issue.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability impact me? :

Exploiting this vulnerability can lead to unauthorized code execution on the host running the Vitrage service. This means an attacker could gain control over the host system with the privileges of the Vitrage service user.

Such unauthorized access can result in further compromise of the Vitrage service and potentially the entire host environment, leading to data breaches, service disruption, or other malicious activities.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart