← Back to CVEs
CVE-2026-24740
CRITICAL9.9
Description
Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
CVE Details
CVSS v3.1 Score9.9
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published1/27/2026
Last Modified2/19/2026
Sourcenvd
Honeypot Sightings0
Affected Products
amirraminfar:dozzle
Weaknesses (CWE)
CWE-284CWE-863CWE-863
References
https://github.com/amir20/dozzle/commit/620e59aa246347ba8a27e68c532853b8a5137bc1(security-advisories@github.com)
https://github.com/amir20/dozzle/releases/tag/v9.0.3(security-advisories@github.com)
https://github.com/amir20/dozzle/security/advisories/GHSA-m855-r557-5rc5(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.