CVE-2026-27130
Dokploy · Dokploy
Dokploy 0.26.6 and below contain an OS command injection vulnerability in the appName parameter, allowing authenticated attackers to execute arbitrary commands with server-level privileges.
Executive summary
An authenticated OS command injection vulnerability in Dokploy allows attackers to achieve server-level code execution, leading to full system compromise.
Vulnerability
The application fails to properly sanitize the appName parameter before passing it to system shell commands, allowing an authenticated attacker to inject shell metacharacters.
Business impact
The CVSS score of 9.9 reflects the high severity of this command injection. An authenticated attacker can escalate their access to full server control, potentially destroying the PaaS environment or gaining access to all hosted applications and their associated data.
Remediation
Immediate Action: Upgrade Dokploy to version 0.26.7 or later.
Proactive Monitoring: Review application logs for unexpected shell commands or character sequences in the appName field.
Compensating Controls: Implement strict input validation on the application creation interface and limit user access to sensitive administrative functions.
Exploitation status
Public Exploit Available: No