Description
ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible during a short moment after the authentication of an user to bypass its authentication. This vulnerability is fixed in 0.112.
Published: 2026-04-10
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass through race condition in two‑factor authentication
Action: Immediate patch
AI Analysis

Impact

A race condition within Ajenti’s core plugin creates a narrow window immediately after a user logs in during which the system fails to enforce the second factor. While the user remains authenticated, the missing token check allows an attacker with any valid credentials to operate without providing the additional authentication step. This flaw results in an unauthorized, persistent session that can be used to access the administration interface with elevated privileges.

Affected Systems

All installations of Ajenti using the core plugin before version 0.112 are vulnerable. The affected product is the Ajenti core plugin, which manages the web‑based administration environment. Users running earlier releases should be aware that 2FA may be bypassed during the brief period after initial authentication.

Risk and Exploitability

The medium CVSS score of 6.9 reflects the potential for privilege escalation once a valid account is compromised. No EPSS score is available, and the flaw is not listed in the CISA Known Exploited Vulnerabilities catalogue. The likely attack path requires initial access to a legitimate user account and exploitation of the race window via the Ajenti web interface. The risk is elevated for systems exposed to untrusted networks where attackers can attempt repeated logins to trigger the condition.

Generated by OpenCVE AI on April 10, 2026 at 20:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ajenti to version 0.112 or later to eliminate the race condition in the 2FA workflow
  • If an upgrade cannot be performed immediately, disable two‑factor authentication for all accounts as a temporary mitigation
  • Continuously monitor authentication logs for patterns that suggest exploitation of the authentication window
  • Verify that the installed plugin version matches the official release signature to rule out tampering

Generated by OpenCVE AI on April 10, 2026 at 20:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8647-755q-fw9p ajenti.plugin.core has race conditions in 2FA
History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Ajenti ajenti Plugin Core
CPEs cpe:2.3:a:ajenti:ajenti_plugin_core:*:*:*:*:*:*:*:*
Vendors & Products Ajenti ajenti Plugin Core
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Ajenti
Ajenti ajenti
Vendors & Products Ajenti
Ajenti ajenti

Fri, 10 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible during a short moment after the authentication of an user to bypass its authentication. This vulnerability is fixed in 0.112.
Title ajenti.plugin.core has a race conditions in 2FA
Weaknesses CWE-287
CWE-362
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U'}


Subscriptions

Ajenti Ajenti Ajenti Plugin Core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-14T03:55:43.193Z

Reserved: 2026-04-09T20:59:17.619Z

Link: CVE-2026-40178

cve-icon Vulnrichment

Updated: 2026-04-13T15:33:22.717Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T20:16:23.117

Modified: 2026-04-21T19:29:55.867

Link: CVE-2026-40178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:32Z

Weaknesses