{"id":"CVE-2025-44021","details":"OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during image handling (if a deployment was performed via the API). A malicious project assigned as a node owner can provide a path to any local file (readable by ironic-conductor), which may then be written to the target node disk. This is difficult to exploit in practice, because a node deployed in this manner should never reach the ACTIVE state, but it still represents a danger in environments running with non-default, insecure configurations such as with automated cleaning disabled. The fixed versions are 24.1.3, 26.1.1, and 29.0.1.","aliases":["GHSA-q3m2-crgq-5p3q","PYSEC-2025-38"],"modified":"2026-04-10T05:26:47.563803Z","published":"2025-05-08T17:16:01Z","references":[{"type":"WEB","url":"https://bugs.launchpad.net/ironic/+bug/2107847"},{"type":"WEB","url":"https://security.openstack.org/ossa/OSSA-2025-001.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/05/08/1"}],"schema_version":"1.7.5"}