OpenOps before 0.6.11 allows remote code execution in the Terraform block.
PUBLISHED5.2CWE-78
Problem type
Affected products
OpenOps
OpenOps
< 0.6.11 - AFFECTED
References
github.com
https://github.com/openops-cloud/openops/pull/1767
linear.app
https://linear.app/openops/issue/OPS-3254
github.com
https://github.com/openops-cloud/openops/releases/tag/0.6.11
github.com
https://github.com/openops-cloud/openops/compare/0.6.10...0.6.11
GitHub Security Advisories
GHSA-6rp6-72p8-59rr
OpenOps before 0.6.11 allows remote code execution in the Terraform block.
https://github.com/advisories/GHSA-6rp6-72p8-59rrOpenOps before 0.6.11 allows remote code execution in the Terraform block.
nvd.nist.gov
https://nvd.nist.gov/vuln/detail/CVE-2025-68922
github.com
https://github.com/openops-cloud/openops/pull/1767
github.com
https://github.com/openops-cloud/openops/compare/0.6.10...0.6.11
github.com
https://github.com/openops-cloud/openops/releases/tag/0.6.11
linear.app
https://linear.app/openops/issue/OPS-3254
github.com
https://github.com/advisories/GHSA-6rp6-72p8-59rr
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-68922Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-68922",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-12-26T14:52:36.571Z",
"dateReserved": "2025-12-24T23:05:18.660Z",
"datePublished": "2025-12-24T23:05:18.982Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-12-24T23:12:22.933Z"
},
"descriptions": [
{
"lang": "en",
"value": "OpenOps before 0.6.11 allows remote code execution in the Terraform block."
}
],
"affected": [
{
"vendor": "OpenOps",
"product": "OpenOps",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "semver",
"lessThan": "0.6.11"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
"cweId": "CWE-78",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://github.com/openops-cloud/openops/pull/1767"
},
{
"url": "https://linear.app/openops/issue/OPS-3254"
},
{
"url": "https://github.com/openops-cloud/openops/releases/tag/0.6.11"
},
{
"url": "https://github.com/openops-cloud/openops/compare/0.6.10...0.6.11"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH"
}
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-12-26T14:52:36.571Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}