- Description
- n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enforces access controls, the GraphQL endpoint does not apply proper filtering, leading to an authorization bypass.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
- Products
- foreman, satellite, satellite_capsule, enterprise_linux
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
CVE-2025-9572 GraphQL Authorization Bypass in Foreman Allowing Unauthorized Meta... https://t.co/MUcaJ40S6Z Customizable Vulnerability Alerts: https://t.co/U7998fz7yk
@VulmonFeeds
27 Feb 2026
32 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CVE-2025-9572 n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enf… https://t.co/bZpJvpu0PY
@CVEnew
27 Feb 2026
74 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:theforeman:foreman:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D99F6FA-1E2E-4914-A644-C114F9780C16",
"versionEndExcluding": "3.16.2",
"versionStartIncluding": "1.22.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:satellite:6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1F12DC81-33E9-4693-8636-7A1AD20D5CA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:satellite:6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DD7B59EF-75E0-41FE-A5D6-BCE41107E2D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:satellite:6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "342183ED-1495-4481-9164-B3ED8424B618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:satellite:6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C2205338-7476-46DC-ABB2-52F0BBAAD01D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:satellite_capsule:6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "142F6FF2-B450-4309-B56A-6B8C0640E2D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:satellite_capsule:6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "EB9D21EC-ABF6-49AC-A353-5A5BEAA5EE03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:satellite_capsule:6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3723A5-FB16-4259-BABF-918506E2CF05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:satellite_capsule:6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D9B1769A-37F4-40CB-B613-7B60C4F63D4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]