CVE-2026-23846

Tugtainer is a self-hosted app for automating updates of Docker containers. In versions prior to 1.16.1, the password authentication mechanism transmits passwords via URL query parameters instead of the HTTP request body. This causes passwords to be logged in server access logs and potentially exposed through browser history, Referer headers, and proxy logs. Version 1.16.1 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:quenary:tugtainer:*:*:*:*:*:docker:*:*

History

05 Feb 2026, 18:44

Type Values Removed Values Added
CPE cpe:2.3:a:quenary:tugtainer:*:*:*:*:*:docker:*:*
References () https://github.com/Quenary/tugtainer/commit/9d23bf40ac1d39005582abfcf0a84753a4e29d52 - () https://github.com/Quenary/tugtainer/commit/9d23bf40ac1d39005582abfcf0a84753a4e29d52 - Patch
References () https://github.com/Quenary/tugtainer/security/advisories/GHSA-f2qf-f544-xm4p - () https://github.com/Quenary/tugtainer/security/advisories/GHSA-f2qf-f544-xm4p - Exploit, Vendor Advisory
First Time Quenary tugtainer
Quenary

19 Jan 2026, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-19 20:15

Updated : 2026-02-05 18:44


NVD link : CVE-2026-23846

Mitre link : CVE-2026-23846

CVE.ORG link : CVE-2026-23846


JSON object : View

Products Affected

quenary

  • tugtainer
CWE
CWE-598

Use of GET Request Method With Sensitive Query Strings