CVE-2026-1531: foreman_kubevirt disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set
(updated )
A flaw was found in foreman_kubevirt. When configuring the connection to OpenShift, the system disables SSL verification if a Certificate Authority (CA) certificate is not explicitly set. This insecure default allows a remote attacker, capable of intercepting network traffic between Satellite and OpenShift, to perform a Man-in-the-Middle (MITM) attack. Such an attack could lead to the disclosure or alteration of sensitive information.
References
- access.redhat.com/security/cve/CVE-2026-1531
- bugzilla.redhat.com/show_bug.cgi?id=2433786
- github.com/advisories/GHSA-2qxw-7fmx-gqfm
- github.com/rubysec/ruby-advisory-db/blob/master/gems/foreman_kubevirt/CVE-2026-1531.yml
- github.com/theforeman/foreman_kubevirt
- github.com/theforeman/foreman_kubevirt/commit/6c9973ee59c6fbec65f165eb9ea9dd4ebb6eeef1
- nvd.nist.gov/vuln/detail/CVE-2026-1531
Code Behaviors & Features
Detect and mitigate CVE-2026-1531 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →