Tugtainer is a self-hosted app for automating updates of Docker containers. In versions prior to 1.16.1, the password authentication mechanism transmits passwords via URL query parameters instead of the HTTP request body. This causes passwords to be logged in server access logs and potentially exposed through browser history, Referer headers, and proxy logs. Version 1.16.1 patches the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 20 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Quenary
Quenary tugtainer
Vendors & Products Quenary
Quenary tugtainer

Mon, 19 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
Description Tugtainer is a self-hosted app for automating updates of Docker containers. In versions prior to 1.16.1, the password authentication mechanism transmits passwords via URL query parameters instead of the HTTP request body. This causes passwords to be logged in server access logs and potentially exposed through browser history, Referer headers, and proxy logs. Version 1.16.1 patches the issue.
Title Tugtainer vulnerable to Password Exposure via URL Query Parameter
Weaknesses CWE-598
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-20T14:40:03.105Z

Reserved: 2026-01-16T15:46:40.843Z

Link: CVE-2026-23846

cve-icon Vulnrichment

Updated: 2026-01-20T14:39:55.824Z

cve-icon NVD

Status : Received

Published: 2026-01-19T20:15:49.243

Modified: 2026-01-19T20:15:49.243

Link: CVE-2026-23846

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-20T08:40:34Z

Weaknesses