Impact
The vulnerability in OpenStack Ironic allows untrusted ks_template data to be rendered without sandboxing, creating a template injection flaw. This flaw could enable malicious template code to be executed in the context of the Ironic service. The impact would be limited to the integrity and confidentiality of the Ironic environment and the data it manages, rather than a full system compromise.
Affected Systems
OpenStack Ironic releases up to and including the 35.x series are affected. Only deployments using these versions are impacted; newer releases have not been confirmed to contain the issue.
Risk and Exploitability
The CVSS score of 3 indicates a low severity risk, and no EPSS score is available for this vulnerability. It is not listed in CISA’s KEV catalog. The likely attack vector is user-supplied instance metadata that includes a ks_template payload; an attacker with privileges to submit such metadata could exploit the flaw. Because the vulnerability requires input from a user of the Ironic service, exploitation is limited to those with provisioning rights.
OpenCVE Enrichment