Tugtainer is a self-hosted app for automating updates of docker containers. In versions prior to 1.15.1, arbitary arguments can be injected in tugtainer-agent `POST api/command/run`. Version 1.15.1 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/Quenary/tugtainer/commit/dbb17d843e30fd7509acf0328c913dcb42f40831 | Patch |
| https://github.com/Quenary/tugtainer/pull/88 | Issue Tracking Patch |
| https://github.com/Quenary/tugtainer/releases/tag/v1.15.1 | Product Release Notes |
| https://github.com/Quenary/tugtainer/security/advisories/GHSA-grc3-8w5x-g54q | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-29 16:15
Updated : 2026-02-20 16:55
NVD link : CVE-2025-69201
Mitre link : CVE-2025-69201
CVE.ORG link : CVE-2025-69201
JSON object : View
Products Affected
quenary
- tugtainer
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
