ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible to bypass the password authentication This vulnerability is fixed in 0.112.
References
| Link | Resource |
|---|---|
| https://github.com/ajenti/ajenti/security/advisories/GHSA-3mcx-6wxm-qr8v | Vendor Advisory |
Configurations
History
21 Apr 2026, 19:31
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Ajenti
Ajenti ajenti Plugin Core |
|
| References | () https://github.com/ajenti/ajenti/security/advisories/GHSA-3mcx-6wxm-qr8v - Vendor Advisory | |
| CPE | cpe:2.3:a:ajenti:ajenti_plugin_core:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo |
10 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 20:16
Updated : 2026-04-21 19:31
NVD link : CVE-2026-40177
Mitre link : CVE-2026-40177
CVE.ORG link : CVE-2026-40177
JSON object : View
Products Affected
ajenti
- ajenti_plugin_core
CWE
