{
  "threat_severity" : "Moderate",
  "public_date" : "2025-08-29T06:12:00Z",
  "bugzilla" : {
    "description" : "foreman: Satellite: GraphQL API permission bypass leads to information disclosure",
    "id" : "2391715",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2391715"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-863",
  "details" : [ "n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enforces access controls, the GraphQL endpoint does not apply proper filtering, leading to an authorization bypass.", "n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enforces access controls, the GraphQL endpoint does not apply proper filtering, leading to an authorization bypass." ],
  "acknowledgement" : "Red Hat would like to thank Ohad Levy (Redhat) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Satellite 6.15 for RHEL 8",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21897",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.15::el8",
    "package" : "foreman-0:3.9.1.14-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.15 for RHEL 8",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21897",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.15::el8",
    "package" : "satellite-0:6.15.5.7-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.16 for RHEL 8",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21894",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.16::el8",
    "package" : "foreman-0:3.12.0.12-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.16 for RHEL 8",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21894",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.16::el8",
    "package" : "satellite-0:6.16.5.6-1.el8sat"
  }, {
    "product_name" : "Red Hat Satellite 6.16 for RHEL 9",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21894",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.16::el9",
    "package" : "foreman-0:3.12.0.12-1.el9sat"
  }, {
    "product_name" : "Red Hat Satellite 6.16 for RHEL 9",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21894",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.16::el9",
    "package" : "satellite-0:6.16.5.6-1.el9sat"
  }, {
    "product_name" : "Red Hat Satellite 6.17 for RHEL 9",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21893",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.17::el9",
    "package" : "foreman-0:3.14.0.11-1.el9sat"
  }, {
    "product_name" : "Red Hat Satellite 6.18 for RHEL 9",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21886",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.18::el9",
    "package" : "foreman-0:3.16.0.7-1.el9sat"
  }, {
    "product_name" : "Red Hat Satellite 6.18 for RHEL 9",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21886",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.18::el9",
    "package" : "rubygem-katello-0:4.18.0.4-1.el9sat"
  }, {
    "product_name" : "Red Hat Satellite 6.18 for RHEL 9",
    "release_date" : "2025-11-20T00:00:00Z",
    "advisory" : "RHSA-2025:21886",
    "cpe" : "cpe:/a:redhat:satellite_utils:6.18::el9",
    "package" : "satellite-0:6.18.1-1.el9sat"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-9572\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-9572\nhttps://theforeman.org/security.html#2025-9572" ],
  "name" : "CVE-2025-9572",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}