CVE-2026-24841

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameters are directly interpolated into shell commands without sanitization, allowing authenticated attackers to execute arbitrary commands on the host server. Version 0.26.6 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*

History

04 Feb 2026, 17:37

Type Values Removed Values Added
References () https://github.com/Dokploy/dokploy/blob/canary/apps/dokploy/server/wss/docker-container-terminal.ts - () https://github.com/Dokploy/dokploy/blob/canary/apps/dokploy/server/wss/docker-container-terminal.ts - Product
References () https://github.com/Dokploy/dokploy/commit/74e0bd5fe3ef7199f44fcd19c6f5a2f09b806d6f - () https://github.com/Dokploy/dokploy/commit/74e0bd5fe3ef7199f44fcd19c6f5a2f09b806d6f - Patch
References () https://github.com/Dokploy/dokploy/security/advisories/GHSA-vx6x-6559-x35r - () https://github.com/Dokploy/dokploy/security/advisories/GHSA-vx6x-6559-x35r - Exploit, Vendor Advisory, Mitigation
CPE cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*
First Time Dokploy dokploy
Dokploy

28 Jan 2026, 01:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-28 01:16

Updated : 2026-02-04 17:37


NVD link : CVE-2026-24841

Mitre link : CVE-2026-24841

CVE.ORG link : CVE-2026-24841


JSON object : View

Products Affected

dokploy

  • dokploy
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')