Impact
The Vitrage query parser allows a user with API access to craft a malicious query that triggers execution of arbitrary code on the host where the Vitrage service runs. This flaw can lead to unauthorized access to the host, compromising the entire Vitrage instance and potentially the underlying infrastructure. The weakness corresponds to operating‑system command injection and is identified as CWE‑95.
Affected Systems
OpenStack Vitrage in releases prior to 12.0.1, 13.0.0, 14.0.0, and 15.0.0 is affected. The vulnerability is present in all deployments that expose the Vitrage API, regardless of network location.
Risk and Exploitability
The CVSS score of 9.1 reflects a high severity. The low EPSS score (<1%) suggests that exploitation is currently considered unlikely, and the vulnerability is not listed in the CISA KEV catalog. The likely attack path requires a user who is allowed to use the Vitrage API to submit a crafted query; from there the code runs with the service’s system privileges. Organizations should therefore treat any exposed Vitrage API as a high‑risk surface.
OpenCVE Enrichment
Github GHSA