Description
Cockpit 2.13.5 and earlier is affected by a misconfiguration within the Bucket component _isFileTypeAllowed function where a specially crafted filename bypasses an extension filter. This allows an authenticated attacker to rename arbitrary files with the .php file extension enabling arbitrary code to be executed on the underlying server.
Published: 2026-04-29
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Cockpit’s Bucket component allows an attacker who has authenticated access to upload or rename arbitrarily named files. The function responsible for checking a file’s extension can be bypassed by a specially crafted file name, permitting the attacker to attach a .php extension. Once renamed, the server executes the file, giving the attacker the ability to run arbitrary code on the underlying system. The weakness arises from improper input validation during filename handling, creating an opportunity to alter the configuration of the web application’s file‑handling logic. This vulnerability can compromise confidentiality, integrity, and availability of the affected installation.

Affected Systems

Any installation of Cockpit CMS version 2.13.5 or earlier is impacted. The issue originates in the Bucket module, which is part of the core component of Cockpit. End‑users who operate or host such instances should review their configuration for possible exploitation.

Risk and Exploitability

Because the flaw requires authentication, an attacker must have valid credentials, but once authenticated, the attacker can rename any file and trigger PHP execution with full server privileges. No CVSS or EPSS score is publicly available, but the lack of an exploit because of the authentication requirement does not reduce the severity of the damage. The vulnerability is not listed in the CISA KEV catalog, and no official workaround is published. The recommended attack vector is an authenticated session with file management privileges, with the potential for lateral movement and persistence after code execution.

Generated by OpenCVE AI on April 29, 2026 at 21:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cockpit CMS to version 2.14.0 or later, where the Bucket component enforces strict file‑extension checks and disallows arbitrary renaming of files to .php
  • Restrict file‑upload and rename capabilities to privileged users only, and enforce least‑privilege permissions on user accounts that access the CMS
  • Configure the web server to deny execution of PHP files in the upload directory, preventing accidental or malicious PHP execution

Generated by OpenCVE AI on April 29, 2026 at 21:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Title Arbitrary PHP File Rename Enabling Server‑Side Code Execution in Cockpit CMS
Weaknesses CWE-20
CWE-73

Wed, 29 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-434
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Cockpit-hq
Cockpit-hq cockpit
Vendors & Products Cockpit-hq
Cockpit-hq cockpit

Wed, 29 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description Cockpit 2.13.5 and earlier is affected by a misconfiguration within the Bucket component _isFileTypeAllowed function where a specially crafted filename bypasses an extension filter. This allows an authenticated attacker to rename arbitrary files with the .php file extension enabling arbitrary code to be executed on the underlying server.
References

Subscriptions

Cockpit-hq Cockpit
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-29T20:23:41.211Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-38991

cve-icon Vulnrichment

Updated: 2026-04-29T20:21:38.753Z

cve-icon NVD

Status : Deferred

Published: 2026-04-29T16:16:23.797

Modified: 2026-04-29T21:22:20.120

Link: CVE-2026-38991

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T21:30:20Z

Weaknesses