Description
Ajenti is a Linux and BSD modular server admin panel. Prior to 2.2.15, an authenticated user (using the auth_users plugin authentication method) could install a custom package even if this user is not superuser. This vulnerability is fixed in 2.2.15.
Published: 2026-04-06
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass allowing non‑superuser installation of custom packages
Action: Apply Patch
AI Analysis

Impact

An authenticated user who is not a superuser can install a custom package through Ajenti’s auth_users authentication method. This vulnerability provides a weakness where the system fails to enforce proper permissions, and based on the description it is inferred that installing a custom package might allow the attacker to execute arbitrary code or achieve privilege escalation.

Affected Systems

The issue affects Ajenti versions prior to 2.2.15. The affected product is Ajenti, a Linux and BSD modular server admin panel, and the problem was fixed in release v2.2.15.

Risk and Exploitability

The CVSS score of 7.2 indicates high severity, and the vulnerability requires authenticated access to the Ajenti interface. The CVE description does not specify whether the attack can be performed remotely or locally; it is inferred that if the attacker already has credentials, the exploit could be launched over the network. The EPSS score is not available and the vulnerability is not listed in the KEV catalog, but the potential for privilege escalation warrants prompt action.

Generated by OpenCVE AI on April 7, 2026 at 02:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ajenti to version 2.2.15 or newer.
  • Ensure that only superuser accounts are permitted to install custom packages.
  • If an upgrade is not immediately possible, disable custom package installation for non‑superuser accounts or restrict the auth_users plugin.
  • Confirm that no other authenticated users have unnecessary permissions.

Generated by OpenCVE AI on April 7, 2026 at 02:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-73jv-44c3-j5p2 Ajenti has an authorization bypass during custom package installation
History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Ajenti
Ajenti ajenti
Vendors & Products Ajenti
Ajenti ajenti

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Ajenti is a Linux and BSD modular server admin panel. Prior to 2.2.15, an authenticated user (using the auth_users plugin authentication method) could install a custom package even if this user is not superuser. This vulnerability is fixed in 2.2.15.
Title Ajenti has an authorization bypass during custom package installation
Weaknesses CWE-862
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T15:59:22.076Z

Reserved: 2026-04-01T17:26:21.133Z

Link: CVE-2026-35175

cve-icon Vulnrichment

Updated: 2026-04-07T15:17:10.337Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T18:16:43.830

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-35175

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:54Z

Weaknesses