Red Hat Satellite
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Red Hat Satellite.
Recent Red Hat Satellite Security Advisories
| Advisory | Title | Published |
|---|---|---|
| RHSA-2026:2765 | (RHSA-2026:2765) Important: Satellite 6.16.6.1 Async Update | February 16, 2026 |
| RHSA-2026:2764 | (RHSA-2026:2764) Important: Satellite 6.17.6.3 Async Update | February 16, 2026 |
| RHSA-2026:2760 | (RHSA-2026:2760) Important: Satellite 6.18.3 Async Update | February 16, 2026 |
| RHSA-2026:1504 | (RHSA-2026:1504) satellite/foreman-mcp-server-rhel9 container image available as a Technology Preview | January 28, 2026 |
| RHSA-2026:0629 | (RHSA-2026:0629) satellite/foreman-mcp-server-rhel9 container image available as a Technology Preview | January 14, 2026 |
| RHSA-2025:21897 | (RHSA-2025:21897) Moderate: Satellite 6.15.5.7 Async Update | November 20, 2025 |
| RHSA-2025:21894 | (RHSA-2025:21894) Moderate: Satellite 6.16.5.6 Async Update | November 20, 2025 |
| RHSA-2025:21893 | (RHSA-2025:21893) Moderate: Satellite 6.17.6.1 Async Update | November 20, 2025 |
| RHSA-2025:21886 | (RHSA-2025:21886) Moderate: Satellite 6.18.1 Async Update | November 20, 2025 |
| RHSA-2025:19856 | (RHSA-2025:19856) Important: Satellite 6.15.5.6 Async Update | November 6, 2025 |
By the Year
In 2026 there have been 6 vulnerabilities in Red Hat Satellite with an average score of 7.6 out of ten. Last year, in 2025 Satellite had 7 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Satellite in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 1.31.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 6 | 7.55 |
| 2025 | 7 | 6.24 |
| 2024 | 11 | 6.88 |
| 2023 | 7 | 7.77 |
| 2022 | 7 | 6.55 |
| 2021 | 9 | 6.68 |
| 2020 | 3 | 7.05 |
| 2019 | 38 | 5.38 |
| 2018 | 60 | 6.04 |
It may take a day or so for new Satellite vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Satellite Security Vulnerabilities
REXML ReDoS via Hex Char Ref Parsing
CVE-2025-10990
7.5 - High
- February 27, 2026
A flaw was found in REXML. A remote attacker could exploit inefficient regular expression (regex) parsing when processing hex numeric character references (&#x...;) in XML documents. This could lead to a Regular Expression Denial of Service (ReDoS), impacting the availability of the affected component. This issue is the result of an incomplete fix for CVE-2024-49761.
ReDoS
RCE via Malicious Username in RubyIPMI (Red Hat Satellite BMC)
CVE-2026-0980
8.3 - High
- February 27, 2026
A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.
Shell injection
Authorization Bypass in Foreman GraphQL API (CVE-2025-9572)
CVE-2025-9572
5 - Medium
- February 27, 2026
n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enforces access controls, the GraphQL endpoint does not apply proper filtering, leading to an authorization bypass.
Information Disclosure
MITM via Disabled Cert Validation in fog-kubevirt
CVE-2026-1530
8.1 - High
- February 02, 2026
A flaw was found in fog-kubevirt. This vulnerability allows a remote attacker to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. This enables the attacker to intercept and potentially alter sensitive communications between Satellite and OpenShift, resulting in information disclosure and data integrity compromise.
Improper Certificate Validation
Red Hat Foreman_kubevirt SSL Verification Flaw (MITM Risk)
CVE-2026-1531
8.1 - High
- February 02, 2026
A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of intercepting network traffic between Satellite and OpenShift, to perform a Man-in-the-Middle (MITM) attack. Such an attack could lead to the disclosure or alteration of sensitive information.
Improper Certificate Validation
Hibernate Second-Order SQLi via InlineIdsOrClauseBuilder
CVE-2026-0603
8.3 - High
- January 23, 2026
A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application's database, resulting in an application level denial of service.
SQL Injection
Rubygem MQTT Hostname Validation Missing Allows MITM
CVE-2025-12790
7.4 - High
- November 06, 2025
A flaw was found in Rubygem MQTT. By default, the package used to not have hostname validation, resulting in possible Man-in-the-Middle (MITM) attack.
Path Traversal: '\..\filename'
Red Hat Satellite Foreman Untrusted Exec via Misconfigured Cmd Whitelist
CVE-2025-10622
8 - High
- November 05, 2025
A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validation of command whitelisting.
Shell injection
Yggdrasil local PrivEsc via unauth DBus dispatch to package manager worker
CVE-2025-3931
7.8 - High
- May 14, 2025
A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages. This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.
Improper Handling of Insufficient Permissions or Privileges
crossbeam-channel: Drop race may lead to double-free (CVE-2025-4574)
CVE-2025-4574
6.5 - Medium
- May 13, 2025
In crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption.
Double-free
Ring crate panic via QUIC protocol overflow (CVE-2025-4432)
CVE-2025-4432
5.3 - Medium
- May 09, 2025
A flaw was found in Rust's Ring package. A panic may be triggered when overflow checking is enabled. In the QUIC protocol, this flaw allows an attacker to induce this panic by sending a specially crafted packet. It will likely occur unintentionally in 1 out of every 2**32 packets sent or received.
Allocation of Resources Without Limits or Throttling
Foreman: /var/tmp Permission Flaw Enables Info Disclosure & Priv Escalation
CVE-2025-2157
3.3 - Low
- March 15, 2025
A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information disclosure and privilege escalation if exploited effectively.
Insecure Storage of Sensitive Information
serialize-javascript XSS via unsanitized regex input
CVE-2024-11831
5.4 - Medium
- February 10, 2025
A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.
XSS
Foreman GraphQL API Sensitive Data Exposure
CVE-2024-6861
7.5 - High
- November 06, 2024
A disclosure of sensitive information flaw was found in foreman via the GraphQL API. If the introspection feature is enabled, it is possible for attackers to retrieve sensitive admin authentication keys which could result in a compromise of the entire product's API.
Information Disclosure
CVE-2024-8553: Authenticated Macro RCE in Foreman Templates
CVE-2024-8553
6.3 - Medium
- October 31, 2024
A vulnerability was found in Foreman's loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman's database. By using specific strings in the loader macros, users can bypass permissions and access sensitive information.
Information Disclosure
Uninitialized Buffer in Go FIPS OpenSSL May Cause False HMAC Match
CVE-2024-9355
6.5 - Medium
- October 01, 2024
A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.
Use of Uninitialized Variable
Auth Bypass in Foreman Satellite 6.13-6.15 via mod_proxy header issue
CVE-2024-7012
9.8 - Critical
- September 04, 2024
An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.
authentification
Auth Bypass in Pulpcore v3.0+ via Gunicorn <=22.0 + mod_proxy
CVE-2024-7923
- September 04, 2024
An authentication bypass vulnerability has been identified in Pulpcore when deployed with Gunicorn versions prior to 22.0, due to the puppet-pulpcore configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) which are using Pulpcore version 3.0+ and could potentially enable unauthorized users to gain administrative access.
authentification
Command Injection in Foreman Host Init Config Template (CVE-2024-7700)
CVE-2024-7700
6.5 - Medium
- August 12, 2024
A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script.
Command Injection
Pulp RBAC flaw causes improper perms via AutoAddObjPermsMixin (CVE-2024-7143)
CVE-2024-7143
- August 07, 2024
A flaw was found in the Pulp package. When a role-based access control (RBAC) object in Pulp is set to assign permissions on its creation, it uses the `AutoAddObjPermsMixin` (typically the add_roles_for_object_creator method). This method finds the object creator by checking the current authenticated user. For objects that are created within a task, this current user is set by the first user with any permissions on the task object. This means the oldest user with model/domain-level task permissions will always be set as the current user of a task, even if they didn't dispatch the task. Therefore, all objects created in tasks will have their permissions assigned to this oldest user, and the creating user will receive nothing.
Insecure Inherited Permissions
Katello Foreman XSS via User Description Field
CVE-2024-4812
4.8 - Medium
- June 05, 2024
A flaw was found in the Katello plugin for Foreman, where it is possible to store malicious JavaScript code in the "Description" field of a user. This code can be executed when opening certain pages, for example, Host Collections.
XSS
Foreman-installer Process Pw Leak via --pw flag
CVE-2024-3716
6.2 - Medium
- June 05, 2024
A flaw was found in foreman-installer when puppet-candlepin is invoked cpdb with the --password parameter. This issue leaks the password in the process list and allows an attacker to take advantage and obtain the password.
Information Disclosure
Red Hat Satellite Remote Exec Ignores SSH Key Validation (MITM risk)
CVE-2024-4871
6.8 - Medium
- May 14, 2024
A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to a man-in-the-middle attack (MITM), denial of service, leaking of secrets the remote execution job contains, or other issues that may arise from the attacker's ability to forge an SSH key. This issue does not directly allow unauthorized remote execution on the Satellite, although it can leak secrets that may lead to it.
Key Exchange without Entity Authentication
python-cryptography: Remote Decryption of TLS RSA Exchanges
CVE-2023-50782
7.5 - High
- February 05, 2024
A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
Observable Timing Discrepancy
CVE-2023-4320: Satellite Token Over-Expiration via Arithmetic Overflow
CVE-2023-4320
7.6 - High
- December 18, 2023
An arithmetic overflow flaw was found in Satellite when creating a new personal access token. This flaw allows an attacker who uses this arithmetic overflow to create personal access tokens that are valid indefinitely, resulting in damage to the system's integrity.
Insufficient Session Expiration
Ansible Path Traversal (Galaxy Importer) Symlink Drop
CVE-2023-5189
6.3 - Medium
- November 14, 2023
A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten.
Relative Path Traversal
HTTP/2 DoS via Stream Reset in nginx
CVE-2023-44487
7.5 - High
- October 10, 2023
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Resource Exhaustion
Candlepin Improper Access Control (CVE-2023-1832)
CVE-2023-1832
8.1 - High
- October 04, 2023
An improper access control flaw was found in Candlepin. An attacker can create data scoped under another customer/tenant, which can result in loss of confidentiality and availability for the affected customer/tenant.
AuthZ
Foreman: Tomcat server.xml SINFO Exposure via World-Readable File
CVE-2023-4886
6.7 - Medium
- October 03, 2023
A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.
Information Disclosure
Foreman: Admin Auth Command Injection via CoreOS/Fedora CoreOS Templates
CVE-2022-3874
9.1 - Critical
- September 22, 2023
A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.
Shell injection
Foreman A* Code Exec via YAML Global Params
CVE-2023-0462
9.1 - Critical
- September 20, 2023
An arbitrary code execution flaw was found in Foreman. This issue may allow an admin user to execute arbitrary code on the underlying operating system by setting global parameters with a YAML payload.
Code Injection
Red Hat Satellite blind S2S RPF via Referer header
CVE-2022-4130
4.5 - Medium
- December 16, 2022
A blind site-to-site request forgery vulnerability was found in Satellite server. It is possible to trigger an external interaction to an attacker's server by modifying the Referer header in an HTTP request of specific resources in the server.
Pulp Ansible Remote Token Plaintext Exposure via API
CVE-2022-3644
5.5 - Medium
- October 25, 2022
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
Insufficiently Protected Credentials
IBM Java SDK <SR1 FP10: plaintext stored in memory dumps (CVE-2015-1931)
CVE-2015-1931
- September 29, 2022
IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file.
PrivEsc RedHat Satellite via Granular Perms Leak
CVE-2021-3414
8.1 - High
- August 26, 2022
A flaw was found in satellite. When giving granular permission related to the organization, other permissions allowing a user to view and manage other organizations are also granted. The highest threat from this vulnerability is to data confidentiality.
Improper Preservation of Permissions
Foreman API Credential Leak Exposes Azure Compute Passwords
CVE-2021-3590
8.8 - High
- August 22, 2022
A flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Cleartext Transmission of Sensitive Information
Red Hat Satellite Plaintext Candlepin Password Disclosure via satellite-installer
CVE-2020-10710
4.4 - Medium
- August 16, 2022
A flaw was found where the Plaintext Candlepin password is disclosed while updating Red Hat Satellite through the satellite-installer. This flaw allows an attacker with sufficiently high privileges, such as root, to retrieve the Candlepin plaintext password.
Insufficiently Protected Credentials
An authorization flaw was found in Foreman Ansible
CVE-2021-3589
8 - High
- March 23, 2022
An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Missing Authentication for Critical Function
A server side remote code execution vulnerability was found in Foreman project
CVE-2021-3584
7.2 - High
- December 23, 2021
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.
Shell injection
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration
CVE-2021-42550
6.6 - Medium
- December 16, 2021
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
Marshaling, Unmarshaling
In Django 2.2 before 2.2.25
CVE-2021-44420
7.3 - High
- December 08, 2021
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
A credential leak vulnerability was found in Red Hat Satellite
CVE-2020-14371
6.5 - Medium
- June 02, 2021
A credential leak vulnerability was found in Red Hat Satellite. This flaw exposes the compute resources credentials through VMs that are running on these resources in Satellite.
Information Disclosure
An account takeover flaw was found in Red Hat Satellite 6.7.2 onward
CVE-2020-14380
7.5 - High
- June 02, 2021
An account takeover flaw was found in Red Hat Satellite 6.7.2 onward. A potential attacker with proper authentication to the relevant external authentication source (SSO or Open ID) can claim the privileges of already existing local users of Satellite.
authentification
A flaw was found in Red Hat Satellite, which allows a privileged attacker to read OMAPI secrets through the ISC DHCP of Smart-Proxy
CVE-2020-14335
5.5 - Medium
- June 02, 2021
A flaw was found in Red Hat Satellite, which allows a privileged attacker to read OMAPI secrets through the ISC DHCP of Smart-Proxy. This flaw allows an attacker to gain control of DHCP records from the network. The highest threat from this vulnerability is to system availability.
Information Disclosure
A flaw was found in Red Hat Satellite's Job Invocation, where the "User Input" entry was not properly restricted to the view
CVE-2020-10716
6.5 - Medium
- May 27, 2021
A flaw was found in Red Hat Satellite's Job Invocation, where the "User Input" entry was not properly restricted to the view. This flaw allows a malicious Satellite user to scan through the Job Invocation, with the ability to search for passwords and other sensitive data. This flaw affects tfm-rubygem-foreman_ansible versions before 4.0.3.4.
A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0
CVE-2021-3413
6.3 - Medium
- April 08, 2021
A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0. A credential leak was identified which will expose Azure Resource Manager's secret key through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Information Disclosure
A flaw was found in Red Hat Satellite
CVE-2021-20256
- February 23, 2021
A flaw was found in Red Hat Satellite. The BMC interface exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Information Disclosure
A flaw was found in Red Hat Satellite 6 which allows privileged attacker to read cache files
CVE-2020-14334
8.8 - High
- July 31, 2020
A flaw was found in Red Hat Satellite 6 which allows privileged attacker to read cache files. These cache credentials could help attacker to gain complete control of the Satellite instance.
Insufficiently Protected Credentials
A flaw was found in Hibernate Validator version 6.1.2.Final
CVE-2020-10693
5.3 - Medium
- May 06, 2020
A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages.
Improper Input Validation
Nokogiri before 1.5.4 is vulnerable to XXE attacks
CVE-2012-6685
- February 19, 2020
Nokogiri before 1.5.4 is vulnerable to XXE attacks
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Satellite or by Red Hat? Click the Watch button to subscribe.