Untriaged
Permalink
CVE-2026-4631
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Cockpit: cockpit: unauthenticated remote code execution due to ssh command-line argument injection
Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
References
Affected products
cockpit
Matching in nixpkgs
pkgs.cockpit
Web-based graphical interface for servers
pkgs.cockpit-zfs
Cockpit plugin for ZFS management by 45Drives
pkgs.cockpit-files
Featureful file browser for Cockpit
pkgs.cockpit-podman
Cockpit UI for podman containers
pkgs.cockpit-machines
Cockpit UI for virtual machines
Package maintainers
-
@lucasew Lucas Eduardo Wendt <lucas59356@gmail.com>
-
@andre4ik3 andre4ik3 <andre4ik3@fastmail.com>
-
@alexandru0-dev Alexandru Nechita <alexandru.italia32+nixpkgs@gmail.com>
-
@hatch01 Eymeric Dechelette <hatchchien@protonmail.com>