Impact
The Accelerator Request (ARQ) API in OpenStack Cyborg does not enforce project ownership at any layer: the database column for project_id is never populated, queries have no project filtering, and the policy decorator compares the caller’s project_id with itself rather than the target resource. Consequently, any authenticated non‑admin user can perform actions such as deleting ARQs that belong to other projects’ instances, causing a denial of service across tenants.
Affected Systems
OpenStack Cyborg releases prior to version 16.0.1 are affected. All deployments of these releases, regardless of domain or size, are vulnerable.
Risk and Exploitability
The CVSS score of 6.3 indicates moderate severity. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an authenticated use of the ARQ API, meaning an attacker must first obtain a non‑admin account. No public exploits have been documented, but the ability to delete ARQs from other tenants can disrupt services and degrade availability for many customers.
OpenCVE Enrichment