CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

theforeman

foreman

28 known vulnerabilities · sorted by CVSS score

CVE-2018-14643
CRITICAL9.8

An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.

theforeman / foreman
Network
Published Sep 21, 2018
Page 1 of 2
CVE-2023-0118
CRITICAL9.1

An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.

theforeman / foreman+1
Network
Published Sep 20, 2023
CVE-2021-3590
HIGH8.8

A flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

theforeman / foreman+1
Network
Published Aug 22, 2022
CVE-2018-1097
HIGH8.8

A flaw was found in foreman before 1.16.1. The issue allows users with limited permissions for powering oVirt/RHV hosts on and off to discover the username and password used to connect to the compute resource.

theforeman / foreman+1
Network
Published Apr 4, 2018
CVE-2023-0462
HIGH8.0

An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.

theforeman / foreman+1
Network
Published Sep 20, 2023
CVE-2022-3874
HIGH8.0

A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.

redhat / satellite+1
Network
Published Sep 22, 2023
CVE-2021-20260
HIGH7.8

A flaw was found in the Foreman project. The Datacenter plugin exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

theforeman / foreman
Local
Published Aug 26, 2022
CVE-2018-16861
HIGH7.6

A cross-site scripting (XSS) flaw was found in the foreman component of satellite. An attacker with privilege to create entries using the Hosts, Monitor, Infrastructure, or Administer Menus is able to execute a XSS attacks against other users, possibly leading to malicious code execution and extraction of the anti-CSRF token of higher privileged users. Foreman before 1.18.3, 1.19.1, and 1.20.0 are vulnerable.

theforeman / foreman+3
Network
Published Dec 7, 2018
CVE-2014-8183
HIGH7.4

It was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resources. An attacker with access to the API and knowledge of the resource name can access resources in other organizations.

theforeman / foreman+1
Network
Published Aug 1, 2019
CVE-2021-3584
HIGH7.2

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

theforeman / foreman+4
Network
Published Dec 23, 2021
CVE-2023-4886
MEDIUM6.7

A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.

theforeman / foreman+1
Local
Published Oct 3, 2023
CVE-2017-2672
MEDIUM6.5

A flaw was found in foreman before version 1.15 in the logging of adding and registering images. An attacker with access to the foreman log file would be able to view passwords for provisioned systems in the log file, allowing them to access those systems.

theforeman / foreman+1
Network
Published Jun 21, 2018
CVE-2018-1096
MEDIUM6.5

An input sanitization flaw was found in the id field in the dashboard controller of Foreman before 1.16.1. A user could use this flaw to perform an SQL injection attack on the back end database.

theforeman / foreman+1
Network
Published Apr 5, 2018
CVE-2024-7700
MEDIUM6.5

A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script.

theforeman / foreman+1
Local
Published Aug 12, 2024
CVE-2016-8613
MEDIUM6.4

A flaw was found in foreman 1.5.1. The remote execution plugin runs commands on hosts over SSH from the Foreman web UI. When a job is submitted that contains HTML tags, the console output shown in the web UI does not escape the output causing any HTML or JavaScript to run in the user's browser. The output of the job is stored, making this a stored XSS vulnerability.

theforeman / foreman
Network
Published Jul 31, 2018
CVE-2016-8639
MEDIUM6.1

It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface.

theforeman / foreman+2
Network
Published Aug 1, 2018
CVE-2016-8634
MEDIUM6.1

A vulnerability was found in foreman 1.14.0. When creating an organization or location in Foreman, if the name contains HTML then the second step of the wizard (/organizations/id/step2) will render the HTML. This occurs in the alertbox on the page. The result is a stored XSS attack if an organization/location with HTML in the name is created, then a user is linked directly to this URL.

theforeman / foreman
Network
Published Aug 1, 2018
CVE-2017-7535
MEDIUM6.1

foreman before version 1.16.0 is vulnerable to a stored XSS in organizations/locations assignment to hosts. Exploiting this requires a user to actively assign hosts to an organization that contains html in its name which is visible to the user prior to taking action.

theforeman / foreman
Network
Published Jul 26, 2018
CVE-2021-3494
MEDIUM5.9

A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0.

theforeman / foreman
Network
Published Apr 26, 2021
CVE-2018-14664
MEDIUM5.4

A flaw was found in foreman from versions 1.18. A stored cross-site scripting vulnerability exists due to an improperly escaped HTML code in the breadcrumbs bar. This allows a user with permissions to edit which attribute is used in the breadcrumbs bar to store code that will be executed on the client side.

theforeman / foreman
Network
Published Oct 12, 2018