CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “theforeman”

46 vulnerabilities found for “theforeman”

Page 1 of 3

CVE-2025-9572
MEDIUM5.0

n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enforces access controls, the GraphQL endpoint does not apply proper filtering, leading to an authorization bypass.

theforeman / foreman+9
Network
Published Feb 27, 2026
Page 1 of 3
CVE-2024-7700
MEDIUM6.5

A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script.

theforeman / foreman+1
Local
Published Aug 12, 2024
CVE-2023-4886
MEDIUM6.7

A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.

theforeman / foreman+1
Local
Published Oct 3, 2023
CVE-2022-3874
HIGH8.0

A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.

redhat / satellite+1
Network
Published Sep 22, 2023
CVE-2023-0462
HIGH8.0

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

theforeman / foreman+1
Network
Published Sep 20, 2023
CVE-2023-0118
CRITICAL9.1

An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.

theforeman / foreman+1
Network
Published Sep 20, 2023
CVE-2021-20260
HIGH7.8

A flaw was found in the Foreman project. The Datacenter plugin exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

theforeman / foreman
Local
Published Aug 26, 2022
CVE-2021-3590
HIGH8.8

A flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

theforeman / foreman+1
Network
Published Aug 22, 2022
CVE-2020-10710
MEDIUM4.4

A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.

theforeman / foreman
Local
Published Aug 16, 2022
CVE-2021-3456
HIGH7.1

An improper authorization handling flaw was found in Foreman. The Salt plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.

theforeman / smart_proxy_salt
Local
Published Mar 30, 2022
CVE-2021-3584
HIGH7.2

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

theforeman / foreman+4
Network
Published Dec 23, 2021
CVE-2021-3469
MEDIUM5.4

Foreman versions before 2.3.4 and before 2.4.0 is affected by an improper authorization handling flaw. An authenticated attacker can impersonate the foreman-proxy if product enable the Puppet Certificate authority (CA) to sign certificate requests that have subject alternative names (SANs). Foreman do not enable SANs by default and `allow-authorization-extensions` is set to `false` unless user change `/etc/puppetlabs/puppetserver/conf.d/ca.conf` configuration explicitly.

theforeman / foreman
Network
Published Jun 3, 2021
CVE-2021-3494
MEDIUM5.9

A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0.

theforeman / foreman
Network
Published Apr 26, 2021
CVE-2021-3413
MEDIUM6.3

A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0. A credential leak was identified which will expose Azure Resource Manager's secret key through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

theforeman / foreman_azurerm+1
Network
Published Apr 8, 2021
CVE-2014-0241
MEDIUM5.5

rubygem-hammer_cli_foreman: File /etc/hammer/cli.modules.d/foreman.yml world readable

theforeman / hammer_cli+1
Local
Published Dec 13, 2019
CVE-2017-2672
MEDIUM6.5

A flaw was found in foreman before version 1.15 in the logging of adding and registering images. An attacker with access to the foreman log file would be able to view passwords for provisioned systems in the log file, allowing them to access those systems.

theforeman / foreman+1
Network
Published Jun 21, 2018
CVE-2016-9593
MEDIUM4.7

foreman-debug before version 1.15.0 is vulnerable to a flaw in foreman-debug's logging. An attacker with access to the foreman log file would be able to view passwords, allowing them to access those systems.

theforeman / foreman+1
Local
Published Apr 16, 2018
CVE-2018-1096
MEDIUM6.5

An input sanitization flaw was found in the id field in the dashboard controller of Foreman before 1.16.1. A user could use this flaw to perform an SQL injection attack on the back end database.

theforeman / foreman+1
Network
Published Apr 5, 2018
CVE-2018-1097
HIGH8.8

A flaw was found in foreman before 1.16.1. The issue allows users with limited permissions for powering oVirt/RHV hosts on and off to discover the username and password used to connect to the compute resource.

theforeman / foreman+1
Network
Published Apr 4, 2018
CVE-2017-2667
HIGH8.1

Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks.

theforeman / hammer_cli+2
Network
Published Mar 12, 2018