Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameters are directly interpolated into shell commands without sanitization, allowing authenticated attackers to execute arbitrary commands on the host server. Version 0.26.6 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/Dokploy/dokploy/blob/canary/apps/dokploy/server/wss/docker-container-terminal.ts | Product |
| https://github.com/Dokploy/dokploy/commit/74e0bd5fe3ef7199f44fcd19c6f5a2f09b806d6f | Patch |
| https://github.com/Dokploy/dokploy/security/advisories/GHSA-vx6x-6559-x35r | Exploit Vendor Advisory Mitigation |
Configurations
History
04 Feb 2026, 17:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Dokploy/dokploy/blob/canary/apps/dokploy/server/wss/docker-container-terminal.ts - Product | |
| References | () https://github.com/Dokploy/dokploy/commit/74e0bd5fe3ef7199f44fcd19c6f5a2f09b806d6f - Patch | |
| References | () https://github.com/Dokploy/dokploy/security/advisories/GHSA-vx6x-6559-x35r - Exploit, Vendor Advisory, Mitigation | |
| CPE | cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:* | |
| First Time |
Dokploy dokploy
Dokploy |
28 Jan 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-28 01:16
Updated : 2026-02-04 17:37
NVD link : CVE-2026-24841
Mitre link : CVE-2026-24841
CVE.ORG link : CVE-2026-24841
JSON object : View
Products Affected
dokploy
- dokploy
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
