Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameters are directly interpolated into shell commands without sanitization, allowing authenticated attackers to execute arbitrary commands on the host server. Version 0.26.6 fixes the issue.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-01-28 01:16
Updated : 2026-01-29 16:31
NVD link : CVE-2026-24841
Mitre link : CVE-2026-24841
CVE.ORG link : CVE-2026-24841
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
