Description
Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, the Dokploy web interface is vulnerable to Clickjacking attacks due to missing frame-busting headers. This allows attackers to embed Dokploy pages in malicious iframes and trick authenticated users into performing unintended actions. Version 0.26.6 patches the issue.
Published: 2026-01-28
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Clickjacking via missing frame protection headers
Action: Patch
AI Analysis

Impact

Dokploy's free, self-hostable PaaS web interface up to version 0.26.5 lacked X‑Frame‑Options and CSP frame‑ancestors headers. This allows attackers to embed legitimate Dokploy pages inside malicious iframes and trick authenticated users into executing unintended actions. The flaw is classified as CWE‑1021 and can lead to credential compromise or accidental submission of sensitive forms, but it does not grant direct access to system files or result in code execution.

Affected Systems

Affected systems are deployment instances of the Dokploy PaaS product, vendor Dokploy. The vulnerability exists in all released versions before 0.26.6, including 0.25.x and 0.26.x releases. Any user running those earlier versions must update to the patched version.

Risk and Exploitability

The CVSS score of 4.7 indicates moderate severity. The EPSS score of less than 1 % reflects a low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Attackers could exploit it over HTTPS by embedding the target site in an iframe, requiring the victim to be authenticated. While the impact is limited to actions performed in the spoofed context, repeated or coordinated attacks could lead to credential theft or data disclosure.

Generated by OpenCVE AI on April 18, 2026 at 20:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Dokploy instance to version 0.26.6 or later, which adds the required X‑Frame‑Options and CSP frame‑ancestors headers.
  • If an upgrade is not immediately possible, configure an external reverse proxy such as nginx or Apache to insert \"X‑Frame‑Options: SAMEORIGIN\" or \"X‑Frame‑Options: DENY\" and a \"Content‑Security‑Policy: frame‑ancestors 'self'\" header on all Dokploy responses.
  • If Dokploy supports custom response headers, enable X‑Frame‑Options and CSP frame‑ancestors directly in the application configuration.

Generated by OpenCVE AI on April 18, 2026 at 20:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*

Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Dokploy
Dokploy dokploy
Vendors & Products Dokploy
Dokploy dokploy

Wed, 28 Jan 2026 00:30:00 +0000

Type Values Removed Values Added
Description Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, the Dokploy web interface is vulnerable to Clickjacking attacks due to missing frame-busting headers. This allows attackers to embed Dokploy pages in malicious iframes and trick authenticated users into performing unintended actions. Version 0.26.6 patches the issue.
Title Dokploy has a clickjacking vulnerability - Missing X-Frame-Options and CSP frame-ancestors headers
Weaknesses CWE-1021
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-28T15:02:29.344Z

Reserved: 2026-01-27T14:51:03.059Z

Link: CVE-2026-24839

cve-icon Vulnrichment

Updated: 2026-01-28T15:02:24.888Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T01:16:14.490

Modified: 2026-02-04T17:58:11.480

Link: CVE-2026-24839

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:45:05Z

Weaknesses