{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-10622","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2025-09-17T11:48:59.825Z","datePublished":"2025-11-05T07:32:14.390Z","dateUpdated":"2026-02-26T17:47:17.722Z"},"containers":{"cna":{"title":"Foreman: os command injection via ct_location and fcct_location parameters","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validation of command whitelisting."}],"affected":[{"vendor":"The Foreman","product":"Foreman","versions":[{"status":"affected","version":"3.12.0","lessThan":"3.16.1","versionType":"semver"}],"packageName":"foreman","collectionURL":"https://github.com/theforeman/foreman","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat Satellite 6.15 for RHEL 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"foreman","defaultStatus":"affected","versions":[{"version":"0:3.9.1.13-1.el8sat","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:satellite:6.15::el8","cpe:/a:redhat:satellite_capsule:6.15::el8","cpe:/a:redhat:satellite_utils:6.15::el8"]},{"vendor":"Red Hat","product":"Red Hat Satellite 6.16 for RHEL 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"foreman","defaultStatus":"affected","versions":[{"version":"0:3.12.0.11-1.el8sat","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:satellite_utils:6.16::el8","cpe:/a:redhat:satellite_capsule:6.16::el8","cpe:/a:redhat:satellite_capsule:6.16::el9","cpe:/a:redhat:satellite:6.16::el8","cpe:/a:redhat:satellite_utils:6.16::el9","cpe:/a:redhat:satellite:6.16::el9"]},{"vendor":"Red Hat","product":"Red Hat Satellite 6.16 for RHEL 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"foreman","defaultStatus":"affected","versions":[{"version":"0:3.12.0.11-1.el9sat","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:satellite_utils:6.16::el8","cpe:/a:redhat:satellite_capsule:6.16::el8","cpe:/a:redhat:satellite_capsule:6.16::el9","cpe:/a:redhat:satellite:6.16::el8","cpe:/a:redhat:satellite_utils:6.16::el9","cpe:/a:redhat:satellite:6.16::el9"]},{"vendor":"Red Hat","product":"Red Hat Satellite 6.17 for RHEL 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"foreman","defaultStatus":"affected","versions":[{"version":"0:3.14.0.10-1.el9sat","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:satellite_capsule:6.17::el9","cpe:/a:redhat:satellite:6.17::el9","cpe:/a:redhat:satellite_utils:6.17::el9","cpe:/a:redhat:satellite_maintenance:6.17::el9"]},{"vendor":"Red Hat","product":"Red Hat Satellite 6.18 for RHEL 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"foreman","defaultStatus":"affected","versions":[{"version":"0:3.16.0.4-1.el9sat","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:satellite_capsule:6.18::el9","cpe:/a:redhat:satellite:6.18::el9","cpe:/a:redhat:satellite_maintenance:6.18::el9","cpe:/a:redhat:satellite_utils:6.18::el9"]},{"vendor":"Red Hat","product":"Red Hat Satellite 6","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"satellite:el8/foreman","defaultStatus":"affected","cpes":["cpe:/a:redhat:satellite:6"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2025:19721","name":"RHSA-2025:19721","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:19832","name":"RHSA-2025:19832","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:19855","name":"RHSA-2025:19855","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:19856","name":"RHSA-2025:19856","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2025-10622","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2396020","name":"RHBZ#2396020","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://theforeman.org/security.html#2025-10622"}],"datePublic":"2025-11-01T23:59:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","workarounds":[{"lang":"en","value":"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}],"timeline":[{"lang":"en","time":"2025-09-17T09:07:39.743Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-11-01T23:59:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Michał Bartoszuk (stmcyber.pl) for reporting this issue."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-02-06T20:07:02.486Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-10622","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-11-06T04:55:32.773793Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:47:17.722Z"}}]}}