Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m855-r557-5rc5 | Dozzle Agent Label-Based Access Control Bypass Allows Unauthorized Container Shell Access |
Thu, 19 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amirraminfar
Amirraminfar dozzle |
|
| CPEs | cpe:2.3:a:amirraminfar:dozzle:*:*:*:*:*:docker:*:* | |
| Vendors & Products |
Amirraminfar
Amirraminfar dozzle |
|
| Metrics |
cvssV3_1
|
Wed, 28 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amir20
Amir20 dozzle |
|
| Vendors & Products |
Amir20
Amir20 dozzle |
Tue, 27 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue. | |
| Title | Dozzle Agent Label-Based Access Control Bypass Allows Unauthorized Container Shell Access | |
| Weaknesses | CWE-284 CWE-863 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-28T21:16:44.096Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24740
Updated: 2026-01-28T21:16:39.221Z
Status : Analyzed
Published: 2026-01-27T21:16:03.277
Modified: 2026-02-19T21:30:24.780
Link: CVE-2026-24740
No data.
OpenCVE Enrichment
Updated: 2026-04-18T02:00:10Z
Github GHSA