CVE-2026-27130

Dokploy · Dokploy

Dokploy 0.26.6 and below contain an OS command injection vulnerability in the appName parameter, allowing authenticated attackers to execute arbitrary commands with server-level privileges.

Executive summary

An authenticated OS command injection vulnerability in Dokploy allows attackers to achieve server-level code execution, leading to full system compromise.

Vulnerability

The application fails to properly sanitize the appName parameter before passing it to system shell commands, allowing an authenticated attacker to inject shell metacharacters.

Business impact

The CVSS score of 9.9 reflects the high severity of this command injection. An authenticated attacker can escalate their access to full server control, potentially destroying the PaaS environment or gaining access to all hosted applications and their associated data.

Remediation

Immediate Action: Upgrade Dokploy to version 0.26.7 or later.

Proactive Monitoring: Review application logs for unexpected shell commands or character sequences in the appName field.

Compensating Controls: Implement strict input validation on the application creation interface and limit user access to sensitive administrative functions.

Exploitation status

Public Exploit Available: No