Impact
OpenStack Horizon versions 25.6 and 25.7 before 25.7.3 allow unauthenticated parties to write to the session storage backend. This regression of a prior fix permits the storage to be deliberately drained, effectively exhausting the backend and disrupting normal service operation. The weakness is an improper validation of authentication state before performing a write operation, classified as CWE-696.
Affected Systems
Vulnerable installations of the OpenStack Horizon web dashboard running version 25.6 and any 25.7 releases earlier than 25.7.3 are impacted. Systems using these Horizon versions should verify their deployed releases and consider upgrading to the patched 25.7.3 release or later.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. The exploit requires only network access to the Horizon service and does not depend on privileged credentials, making it provable by any user. While no EPSS data is available, the lack of KEV listing suggests the vulnerability has not yet been widely exploited in the wild. Nevertheless, the ability to exhaust session storage could degrade availability and negatively affect user experience.
OpenCVE Enrichment