← Retour aux CVEs
CVE-2026-24740
CRITICAL9.9
Description
Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
Details CVE
Score CVSS v3.19.9
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie1/27/2026
Derniere modification2/19/2026
Sourcenvd
Observations honeypot0
Produits affectes
amirraminfar:dozzle
Faiblesses (CWE)
CWE-284CWE-863CWE-863
References
https://github.com/amir20/dozzle/commit/620e59aa246347ba8a27e68c532853b8a5137bc1(security-advisories@github.com)
https://github.com/amir20/dozzle/releases/tag/v9.0.3(security-advisories@github.com)
https://github.com/amir20/dozzle/security/advisories/GHSA-m855-r557-5rc5(security-advisories@github.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.