In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This may result in unauthorized access to the host and further compromise of the Vitrage service. All deployments exposing the Vitrage API are affected. This occurs in _create_query_function in vitrage/graph/query.py.
References
| Link | Resource |
|---|---|
| https://github.com/openstack/vitrage/blob/a1f86950e1314b0c740f9cd9b7e9dbab7d02af51/vitrage/graph/query.py#L70 | Issue Tracking |
| https://storyboard.openstack.org/#%21/story/2011539 | Exploit Issue Tracking Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2026/03/03/6 |
Configurations
Configuration 1 (hide)
|
History
05 Mar 2026, 05:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Feb 2026, 16:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openstack:vitrage:*:*:*:*:*:*:*:* | |
| First Time |
Openstack vitrage
Openstack |
|
| References | () https://github.com/openstack/vitrage/blob/a1f86950e1314b0c740f9cd9b7e9dbab7d02af51/vitrage/graph/query.py#L70 - Issue Tracking | |
| References | () https://storyboard.openstack.org/#%21/story/2011539 - Exploit, Issue Tracking, Vendor Advisory |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Feb 2026, 05:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 05:18
Updated : 2026-03-05 05:16
NVD link : CVE-2026-28370
Mitre link : CVE-2026-28370
CVE.ORG link : CVE-2026-28370
JSON object : View
Products Affected
openstack
- vitrage
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
