CVE-2026-24841

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameters are directly interpolated into shell commands without sanitization, allowing authenticated attackers to execute arbitrary commands on the host server. Version 0.26.6 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-28 01:16

Updated : 2026-02-04 17:37


NVD link : CVE-2026-24841

Mitre link : CVE-2026-24841

CVE.ORG link : CVE-2026-24841


JSON object : View

Products Affected

dokploy

  • dokploy
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')