CVE-2026-40178

ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible during a short moment after the authentication of an user to bypass its authentication. This vulnerability is fixed in 0.112.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ajenti:ajenti_plugin_core:*:*:*:*:*:*:*:*

History

21 Apr 2026, 19:29

Type Values Removed Values Added
References () https://github.com/ajenti/ajenti/security/advisories/GHSA-8647-755q-fw9p - () https://github.com/ajenti/ajenti/security/advisories/GHSA-8647-755q-fw9p - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
First Time Ajenti
Ajenti ajenti Plugin Core
CPE cpe:2.3:a:ajenti:ajenti_plugin_core:*:*:*:*:*:*:*:*

10 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 20:16

Updated : 2026-04-21 19:29


NVD link : CVE-2026-40178

Mitre link : CVE-2026-40178

CVE.ORG link : CVE-2026-40178


JSON object : View

Products Affected

ajenti

  • ajenti_plugin_core
CWE
CWE-287

Improper Authentication

CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')