Command Injection Flaw in Foreman Affects Remote Management Operations
CVE-2026-1961

8HIGH

What is CVE-2026-1961?

CVE-2026-1961 is a command injection vulnerability found in Foreman, a popular lifecycle management tool used for managing servers. Foreman is primarily utilized in DevOps environments for automating tasks such as provisioning, configuration management, and monitoring of virtual and physical servers. The vulnerability arises from the application’s handling of unsanitized hostname values sourced from compute resource providers, which is particularly exploited during the WebSocket proxy interaction. If a remote attacker manipulates these hostname inputs, they could successfully execute arbitrary commands on the Foreman server when a user attempts to access VM VNC console functionality. This flaw could severely undermine an organization’s infrastructure by granting the attacker unwanted access to sensitive systems, potentially compromising valuable credentials and systems.

Potential impact of CVE-2026-1961

  1. Remote Code Execution: Attackers may achieve unauthorized remote code execution, allowing them complete control over the Foreman server. This could lead to a wider compromise of the organization's infrastructure.

  2. Compromise of Sensitive Credentials: The exploitation of this vulnerability may result in the exposure and theft of sensitive information, including credentials, which could facilitate further attacks or data breaches within the organization.

  3. Infrastructure Integrity and Management Risks: With an attacker gaining control, the overall integrity of the operational infrastructure can be jeopardized, potentially disrupting services and impacting organizational business continuity.

Affected Version(s)

Red Hat Satellite 6.16 for RHEL 8 0:3.12.0.14-1.el8sat

Red Hat Satellite 6.16 for RHEL 9 0:3.12.0.14-1.el9sat

Red Hat Satellite 6.17 for RHEL 9 0:3.14.0.14-1.el9sat

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Houssam Sahli for reporting this issue.
.