Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mm7j-mhhj-hj36 | OpenStack Cyborg uses rule:allow (check_str='@') as the default policy for multiple API endpoints |
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openstack
Openstack cyborg |
|
| Vendors & Products |
Openstack
Openstack cyborg |
Fri, 08 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 08 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unrestricted API Access Enables Unauthorized FPGA Reprogramming in OpenStack Cyborg |
Thu, 07 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple API endpoints. This unconditionally authorizes any request carrying a valid Keystone token regardless of roles, project membership, or scope. An authenticated user with zero role assignments can complete various actions such as reprogramming FPGA bitstreams on arbitrary compute nodes via agent RPC. | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T15:47:07.733Z
Reserved: 2026-04-10T00:00:00.000Z
Link: CVE-2026-40213
Updated: 2026-05-08T13:55:49.768Z
Status : Awaiting Analysis
Published: 2026-05-07T22:16:34.910
Modified: 2026-05-08T16:16:10.770
Link: CVE-2026-40213
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:26:32Z
Github GHSA