Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 02 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:ajenti:ajenti:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ajenti
Ajenti ajenti |
|
| Vendors & Products |
Ajenti
Ajenti ajenti |
Thu, 26 Feb 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ajenti is a Linux and BSD modular server admin panel. Prior to version 2.2.13, an unauthenticated user could gain access to a server to execute arbitrary code on this server. This is fixed in the version 2.2.13. | |
| Title | Ajenti has a potential Remote Code Execution | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-27T14:13:28.184Z
Reserved: 2026-02-25T03:24:57.793Z
Link: CVE-2026-27975
Updated: 2026-02-26T14:34:48.524Z
Status : Analyzed
Published: 2026-02-26T03:16:05.130
Modified: 2026-03-02T17:24:59.513
Link: CVE-2026-27975
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:30:20Z