In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API does not enforce project ownership at any layer. The project_id column in the database is never populated (NULL for every ARQ), database queries have no project filtering, and policy checks are self-referential (the authorize_wsgi decorator compares the caller's project_id with itself rather than the target resource). Any authenticated non-admin user can complete various actions such as deleting ARQs bound to other projects' instances, aka cross-tenant denial of service.
Metrics
Affected Vendors & Products
References
History
Fri, 08 May 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cross‑Tenant Denial of Service via Unchecked Accelerator Request API |
Thu, 07 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API does not enforce project ownership at any layer. The project_id column in the database is never populated (NULL for every ARQ), database queries have no project filtering, and policy checks are self-referential (the authorize_wsgi decorator compares the caller's project_id with itself rather than the target resource). Any authenticated non-admin user can complete various actions such as deleting ARQs bound to other projects' instances, aka cross-tenant denial of service. | |
| Weaknesses | CWE-282 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-07T00:00:00.000Z
Updated: 2026-05-07T21:54:10.614Z
Reserved: 2026-04-10T00:00:00.000Z
Link: CVE-2026-40214
No data.
Status : Received
Published: 2026-05-07T22:16:35.047
Modified: 2026-05-07T22:16:35.047
Link: CVE-2026-40214
No data.
ReportizFlow