{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T23:20:41.312","vulnerabilities":[{"cve":{"id":"CVE-2025-44021","sourceIdentifier":"cve@mitre.org","published":"2025-05-08T17:16:01.753","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1."},{"lang":"es","value":"OpenStack Ironic anterior a la versión 29.0.1 puede escribir archivos no deseados en el disco del nodo de destino durante la gestión de imágenes (si se realizó una implementación mediante la API). Un proyecto malicioso asignado como propietario del nodo puede proporcionar una ruta a cualquier archivo local (legible por ironic-conductor), que posteriormente puede escribirse en el disco del nodo de destino. Esto es difícil de explotar en la práctica, ya que un nodo implementado de esta manera nunca debería alcanzar el estado ACTIVO, pero sigue representando un peligro en entornos con configuraciones no predeterminadas e inseguras, como con la limpieza automática deshabilitada. Las versiones corregidas son 24.1.3, 26.1.1 y 29.0.1."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N","baseScore":2.8,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.1,"impactScore":1.4}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"references":[{"url":"https://bugs.launchpad.net/ironic/+bug/2107847","source":"cve@mitre.org"},{"url":"https://security.openstack.org/ossa/OSSA-2025-001.html","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2025/05/08/1","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}