Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m855-r557-5rc5 | Dozzle Agent Label-Based Access Control Bypass Allows Unauthorized Container Shell Access |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amirraminfar
Amirraminfar dozzle |
|
| CPEs | cpe:2.3:a:amirraminfar:dozzle:*:*:*:*:*:docker:*:* | |
| Vendors & Products |
Amirraminfar
Amirraminfar dozzle |
|
| Metrics |
cvssV3_1
|
Wed, 28 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amir20
Amir20 dozzle |
|
| Vendors & Products |
Amir20
Amir20 dozzle |
Tue, 27 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue. | |
| Title | Dozzle Agent Label-Based Access Control Bypass Allows Unauthorized Container Shell Access | |
| Weaknesses | CWE-284 CWE-863 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-28T21:16:44.096Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24740
Updated: 2026-01-28T21:16:39.221Z
Status : Analyzed
Published: 2026-01-27T21:16:03.277
Modified: 2026-02-19T21:30:24.780
Link: CVE-2026-24740
No data.
OpenCVE Enrichment
Updated: 2026-01-28T12:21:59Z
Github GHSA