CVE-2026-27734

Beszel is a server monitoring platform. Prior to version 0.18.2, the hub's authenticated API endpoints GET /api/beszel/containers/logs and GET /api/beszel/containers/info pass the user-supplied "container" query parameter to the agent without validation. The agent constructs Docker Engine API URLs using fmt.Sprintf with the raw value instead of url.PathEscape(). Since Go's http.Client does not sanitize `../` sequences from URL paths sent over unix sockets, an authenticated user (including readonly role) can traverse to arbitrary Docker API endpoints on agent hosts, exposing sensitive infrastructure details. Version 0.18.4 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:beszel:beszel:*:*:*:*:*:*:*:*

History

04 Mar 2026, 16:50

Type Values Removed Values Added
CPE cpe:2.3:a:beszel:beszel:*:*:*:*:*:*:*:*
First Time Beszel beszel
Beszel
References () https://github.com/henrygd/beszel/releases/tag/v0.18.4 - () https://github.com/henrygd/beszel/releases/tag/v0.18.4 - Product, Release Notes
References () https://github.com/henrygd/beszel/security/advisories/GHSA-phwh-4f42-gwf3 - () https://github.com/henrygd/beszel/security/advisories/GHSA-phwh-4f42-gwf3 - Exploit, Vendor Advisory

27 Feb 2026, 20:21

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 20:21

Updated : 2026-03-04 16:50


NVD link : CVE-2026-27734

Mitre link : CVE-2026-27734

CVE.ORG link : CVE-2026-27734


JSON object : View

Products Affected

beszel

  • beszel
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')