Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Red Hat OpenShift AI (RHOAI)

Source -

CNA

CNA CVEs -

9

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
9Vulnerabilities found

CVE-2025-13327
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 3.55%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 07:30
Updated-27 Feb, 2026 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Uv: uv: specially crafted zip archives lead to arbitrary code execution due to parsing differentials

A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interaction to install an attacker-controlled package.

Action-Not Available
Vendor-astral-shRed Hat, Inc.
Product-Red Hat AI Inference ServerRed Hat OpenShift AI (RHOAI)uv
CWE ID-CWE-1286
Improper Validation of Syntactic Correctness of Input
CVE-2025-11065
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.62%
||
7 Day CHG~0.00%
Published-26 Jan, 2026 | 19:36
Updated-03 Feb, 2026 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Github.com/go-viper/mapstructure/v2: go-viper's mapstructure may leak sensitive information in logs in github.com/go-viper/mapstructure

A flaw was found in github.com/go-viper/mapstructure/v2, in the field processing component using mapstructure.WeakDecode. This vulnerability allows information disclosure through detailed error messages that may leak sensitive input values via malformed user-supplied data processed in security-critical contexts.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Certification for Red Hat Enterprise Linux 8Red Hat OpenShift distributed tracing 3Red Hat OpenShift GitOpsRed Hat Trusted Artifact SignerRed Hat Certification Program for Red Hat Enterprise Linux 9Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 9Red Hat Advanced Cluster Management for Kubernetes 2OpenShift PipelinesRed Hat OpenShift Dev SpacesRed Hat Trusted Application PipelineRed Hat OpenShift AI (RHOAI)Red Hat Enterprise Linux 10Red Hat Advanced Cluster Security 4Zero Trust Workload Identity Manager - Tech Preview
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2026-0603
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-8.3||HIGH
EPSS-0.03% / 9.52%
||
7 Day CHG+0.01%
Published-23 Jan, 2026 | 06:31
Updated-26 Feb, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.hibernate/hibernate-core: hibernate: information disclosure and data deletion via second-order sql injection

A flaw was found in Hibernate. A remote attacker with low privileges could exploit a second-order SQL injection vulnerability by providing specially crafted, unsanitized non-alphanumeric characters in the ID column when the InlineIdsOrClauseBuilder is used. This could lead to sensitive information disclosure, such as reading system files, and allow for data manipulation or deletion within the application's database, resulting in an application level denial of service.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Satellite 6Red Hat OpenShift AI (RHOAI)Red Hat OpenShift Dev SpacesRed Hat build of OptaPlanner 8Red Hat Fuse 7Red Hat Data Grid 8Red Hat JBoss Enterprise Application Platform 8Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat AMQ Broker 7
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-12103
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.04% / 10.89%
||
7 Day CHG+0.01%
Published-28 Oct, 2025 | 13:31
Updated-19 Nov, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Openshift-ai: trusty ai grants all authenticated users to list pods in any namespace

A flaw was found in Red Hat Openshift AI Service. The TrustyAI component is granting all service accounts and users on a cluster permissions to get, list, watch any pod in any namespace on the cluster. TrustyAI is creating a role `trustyai-service-operator-lmeval-user-role` and a CRB `trustyai-service-operator-default-lmeval-user-rolebinding` which is being applied to `system:authenticated` making it so that every single user or service account can get a list of pods running in any namespace on the cluster Additionally users can access all `persistentvolumeclaims` and `lmevaljobs`

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift AI 3.0Red Hat OpenShift AI (RHOAI)
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2025-8556
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-3.7||LOW
EPSS-0.02% / 6.48%
||
7 Day CHG+0.01%
Published-06 Aug, 2025 | 08:48
Updated-25 Feb, 2026 | 22:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Github.com/cloudflare/circl: circl-fourq: missing and wrong validation can lead to incorrect results

A flaw was found in CIRCL's implementation of the FourQ elliptic curve. This vulnerability allows an attacker to compromise session security via low-order point injection and incorrect point validation during Diffie-Hellman key exchange.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Builds for Red Hat OpenShiftOpenShift ServerlessRed Hat OpenStack Platform 17.1Red Hat Enterprise Linux 10Red Hat OpenShift Container Platform 4Red Hat Developer HubRed Hat OpenShift GitOpsCustom Metric Autoscaler operator for Red Hat OpenshiftRed Hat Trusted Application PipelineRed Hat Trusted Profile AnalyzerOpenShift Service Mesh 3Red Hat Advanced Cluster Security 4Red Hat OpenStack Platform 16.2Multicluster Global HubOpenShift PipelinesRed Hat Ceph Storage 6Red Hat OpenShift AI (RHOAI)Red Hat Advanced Cluster Management for Kubernetes 2Red Hat Trusted Artifact SignerRed Hat OpenShift for Windows ContainersRed Hat Ceph Storage 8Red Hat OpenShift Virtualization 4Red Hat Enterprise Linux AI (RHEL AI)Red Hat Ceph Storage 5Red Hat Edge Manager previewRed Hat Enterprise Linux 9Red Hat OpenShift Dev Workspaces Operator
CWE ID-CWE-1287
Improper Validation of Specified Type of Input
CVE-2025-6193
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.08% / 23.97%
||
7 Day CHG+0.01%
Published-20 Jun, 2025 | 15:54
Updated-18 Nov, 2025 | 21:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Trustyai-explainability: command injection via lmevaljob cr

A command injection vulnerability was discovered in the TrustyAI Explainability toolkit. Arbitrary commands placed in certain fields of a LMEValJob custom resource (CR) may be executed in the LMEvalJob pod's terminal. This issue can be exploited via a maliciously crafted LMEvalJob by a user with permissions to deploy a CR.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift AI (RHOAI)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-4574
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.78%
||
7 Day CHG+0.01%
Published-13 May, 2025 | 21:47
Updated-20 Nov, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crossbeam-channel: crossbeam-channel vulnerable to double free on drop

In crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Directory Server 11Red Hat Enterprise Linux 10Red Hat Enterprise Linux 9Red Hat Directory Server 12Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 7Red Hat Trusted Profile AnalyzerRed Hat Satellite 6Red Hat Trusted Artifact SignerRed Hat OpenShift AI (RHOAI)Red Hat Enterprise Linux 8
CWE ID-CWE-415
Double Free
CVE-2024-11831
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-1.67% / 81.92%
||
7 Day CHG~0.00%
Published-10 Feb, 2025 | 15:27
Updated-25 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Npm-serialize-javascript: cross-site scripting (xss) in serialize-javascript

A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Single Sign-On 7Red Hat 3scale API Management Platform 2Red Hat OpenShift Pipelines 1.17Red Hat OpenShift Pipelines 1.19RHODF-4.16-RHEL-9OpenShift ServerlessRed Hat Enterprise Linux 10Red Hat Integration Camel K 1Red Hat JBoss Enterprise Application Platform 8Red Hat OpenShift Container Platform 3.11Red Hat Quay 3Red Hat build of Apicurio Registry 2Red Hat OpenShift Pipelines 1.14.6Red Hat OpenShift Pipelines 1.18.0RHODF-4.14-RHEL-9Red Hat Ceph Storage 8.1OpenShift PipelinesRed Hat Advanced Cluster Security 4.5OpenShift Service Mesh 2Red Hat JBoss Enterprise Application Platform 7Logging Subsystem for Red Hat OpenShiftRed Hat Discovery 1Red Hat Ceph Storage 9.0Red Hat Ceph Storage 8Red Hat OpenShift Dev SpacesRed Hat OpenShift Pipelines 1.15Red Hat Fuse 7RHODF-4.15-RHEL-9Red Hat Enterprise Linux 9Red Hat Process Automation 7Red Hat Satellite 6Red Hat Ceph Storage 9Red Hat OpenShift Pipelines 1.16Red Hat Ceph Storage 7.1Red Hat Data Grid 8Red Hat OpenShift Container Platform 4RHODF-4.18-RHEL-9Red Hat Developer HubRHODF-4.17-RHEL-9Red Hat build of Apache Camel - HawtIO 4Red Hat JBoss Enterprise Application Platform Expansion Pack.NET 6.0 on Red Hat Enterprise LinuxMigration Toolkit for VirtualizationRed Hat Trusted Profile AnalyzerRed Hat Enterprise Linux 8OpenShift LightspeedCryostat 3Red Hat OpenShift AI (RHOAI)Red Hat OpenShift distributed tracing 3Red Hat Advanced Cluster Management for Kubernetes 2Red Hat build of OptaPlanner 8Red Hat Ansible Automation Platform 2Red Hat Ceph Storage 7Red Hat Advanced Cluster Security 4Red Hat Advanced Cluster Security 4.4
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-7557
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.10% / 27.83%
||
7 Day CHG~0.00%
Published-08 Aug, 2024 | 21:33
Updated-25 Feb, 2026 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Odh-dashboard: odh-model-controller: cross-model authentication bypass in openshift ai

A vulnerability was found in OpenShift AI that allows for authentication bypass and privilege escalation across models within the same namespace. When deploying AI models, the UI provides the option to protect models with authentication. However, credentials from one model can be used to access other models and APIs within the same namespace. The exposed ServiceAccount tokens, visible in the UI, can be utilized with oc --token={token} to exploit the elevated view privileges associated with the ServiceAccount, leading to unauthorized access to additional resources.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshift_aiopenshift_data_scienceRed Hat OpenShift AI (RHOAI)Red Hat OpenShift Data Science (RHODS)
CWE ID-CWE-305
Authentication Bypass by Primary Weakness