Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28370: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in OpenStack Vitrage

0
Critical
VulnerabilityCVE-2026-28370cvecve-2026-28370cwe-95
Published: Fri Feb 27 2026 (02/27/2026, 04:56:25 UTC)
Source: CVE Database V5
Vendor/Project: OpenStack
Product: Vitrage

Description

In the query parser in OpenStack Vitrage before 12.0.1, 13.0.0, 14.0.0, and 15.0.0, a user allowed to access the Vitrage API may trigger code execution on the Vitrage service host as the user the Vitrage service runs under. This may result in unauthorized access to the host and further compromise of the Vitrage service. All deployments exposing the Vitrage API are affected. This occurs in _create_query_function in vitrage/graph/query.py.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:09:30 UTC

Technical Analysis

CVE-2026-28370 is a critical vulnerability classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, commonly known as 'Eval Injection') found in OpenStack Vitrage's query parser component. The vulnerability arises from unsafe handling of user-supplied input in the _create_query_function method within vitrage/graph/query.py, which dynamically evaluates code based on query parameters. Authenticated users with access to the Vitrage API can craft malicious queries that trigger arbitrary code execution on the host system under the privileges of the Vitrage service user. This flaw affects all deployments exposing the Vitrage API running versions prior to 12.0.1 and specific versions 13.0.0, 14.0.0, and 15.0.0. The vulnerability allows attackers to bypass normal access controls and execute arbitrary commands, potentially leading to unauthorized access, data leakage, service disruption, or full system compromise. The vulnerability has a CVSS v3.1 base score of 9.1, indicating critical severity with network attack vector, low attack complexity, high privileges required, no user interaction, and scope change. No public exploits have been reported yet, but the nature of the vulnerability and its impact make it a high-risk issue for organizations using OpenStack Vitrage for cloud infrastructure monitoring and root cause analysis.

Potential Impact

The impact of CVE-2026-28370 is severe for organizations deploying OpenStack Vitrage, especially those exposing the Vitrage API to authenticated users. Exploitation can lead to arbitrary code execution on the host running the Vitrage service, potentially allowing attackers to escalate privileges, access sensitive data, manipulate monitoring results, disrupt cloud infrastructure monitoring, or pivot to other internal systems. This compromises the confidentiality, integrity, and availability of the Vitrage service and potentially the broader cloud environment it monitors. Given Vitrage's role in root cause analysis and event correlation in OpenStack clouds, a compromised Vitrage instance can undermine trust in monitoring data and cloud operational security. Organizations relying on Vitrage for critical cloud management functions face risks of operational disruption and data breaches. The vulnerability's network accessibility and low complexity of exploitation increase the likelihood of targeted attacks once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2026-28370, organizations should immediately upgrade OpenStack Vitrage to a fixed version beyond 12.0.1 or versions later than 15.0.0 where the vulnerability is patched. If upgrading is not immediately feasible, restrict access to the Vitrage API to trusted and authenticated users only, ideally limiting API exposure to internal networks or VPNs. Implement strict API authentication and authorization controls to minimize the risk of malicious query injection. Employ runtime application monitoring and intrusion detection to identify anomalous query patterns or unexpected code execution behaviors. Review and harden the configuration of the Vitrage service user to limit privileges on the host system, reducing the impact of potential exploitation. Additionally, consider deploying web application firewalls (WAFs) or API gateways with custom rules to detect and block suspicious query inputs targeting the vulnerable function. Regularly audit logs for unusual API activity and prepare incident response plans for potential exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-27T04:52:33.518Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1276f32ffcdb8a2e563fa

Added to database: 2/27/2026, 5:11:11 AM

Last enriched: 3/6/2026, 9:09:30 PM

Last updated: 4/13/2026, 9:28:39 AM

Views: 234

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses