CVE-2026-0980: rubyipmi is vulnerable to OS Command Injection through malicious usernames
(updated )
A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.
References
- access.redhat.com/security/cve/CVE-2026-0980
- bugzilla.redhat.com/show_bug.cgi?id=2429874
- github.com/advisories/GHSA-hfcp-477w-3wjw
- github.com/logicminds/rubyipmi
- github.com/logicminds/rubyipmi/commit/252503a7b4dca68388165883b0322024e344a215
- github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyipmi/CVE-2026-0980.yml
- nvd.nist.gov/vuln/detail/CVE-2026-0980
Code Behaviors & Features
Detect and mitigate CVE-2026-0980 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →