Openshift
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Openshift product.
RSS Feeds for Openshift security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Openshift products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Openshift Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Openshift. Last year, in 2025 Openshift had 4 security vulnerabilities published. Right now, Openshift is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 4 | 7.38 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 1 | 5.30 |
| 2021 | 0 | 0.00 |
| 2020 | 1 | 0.00 |
| 2019 | 3 | 0.00 |
It may take a day or so for new Openshift vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Openshift Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-7195 | Aug 07, 2025 |
Operator SDK <0.15.2 RCE via insecure user_setup /etc/passwdEarly versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images. In affected images, the /etc/passwd file is created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container. |
|
| CVE-2025-7425 | Jul 10, 2025 |
libxslt Heap Corruption via atype Flag ManipulationA flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption. |
And others... |
| CVE-2025-6021 | Jun 12, 2025 |
Stack Overflow in libxml2 xmlBuildQName (CVE-2025-6021)A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. |
And others... |
| CVE-2025-5914 | Jun 09, 2025 |
Integer Overflow in libarchive RAR Reader Causes Double-FreeA vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition. |
|
| CVE-2015-3207 | Jul 07, 2022 |
In Openshift Origin 3 the cookies being set in console have no 'secure'In Openshift Origin 3 the cookies being set in console have no 'secure', 'HttpOnly' attributes. |
|
| CVE-2020-10752 | Jun 12, 2020 |
A flaw was found in the OpenShift API ServerA flaw was found in the OpenShift API Server, where it failed to sufficiently protect OAuthTokens by leaking them into the logs when an API Server panic occurred. This flaw allows an attacker with the ability to cause an API Server error to read the logs, and use the leaked OAuthToken to log into the API Server with the leaked token. |
|
| CVE-2013-0196 | Dec 30, 2019 |
A CSRF issue was found in OpenShift Enterprise 1.2A CSRF issue was found in OpenShift Enterprise 1.2. The web console is using 'Basic authentication' and the REST API has no CSRF attack protection mechanism. This can allow an attacker to obtain the credential and the Authorization: header when requesting the REST API via web browser. |
|
| CVE-2014-0163 | Dec 11, 2019 |
Openshift has shell command injection flaws due to unsanitized data being passed into shell commands.Openshift has shell command injection flaws due to unsanitized data being passed into shell commands. |
|
| CVE-2014-0023 | Nov 15, 2019 |
OpenShift: Install script has temporary file creation vulnerabilityOpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution |