wid-sec-w-2026-0912
·
Published 2026-03-29
·
View on BSI CERT-Bund ↗
Foreman: Vulnerability allows Code execution
CVSS 8.0
HIGH
Risk Summary
A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure.
CVEs (1)
Affected Vendors
Open Source
Affected Products (6)
Open Source
·
Foreman
<3.18.1
Open Source
·
Foreman
3.18.1
Open Source
·
Foreman
<3.17.2
Open Source
·
Foreman
3.17.2
Open Source
·
Foreman
<3.16.3
Open Source
·
Foreman
3.16.3
Get alerted to advisories like this
OTWarden monitors CISA, BSI, Siemens, Rockwell and more — and emails you within 2 hours when your vendors are affected.
Start free trial Learn more