Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-73jv-44c3-j5p2 | Ajenti has an authorization bypass during custom package installation |
Mon, 20 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ajenti:ajenti:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ajenti
Ajenti ajenti |
|
| Vendors & Products |
Ajenti
Ajenti ajenti |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ajenti is a Linux and BSD modular server admin panel. Prior to 2.2.15, an authenticated user (using the auth_users plugin authentication method) could install a custom package even if this user is not superuser. This vulnerability is fixed in 2.2.15. | |
| Title | Ajenti has an authorization bypass during custom package installation | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T15:59:22.076Z
Reserved: 2026-04-01T17:26:21.133Z
Link: CVE-2026-35175
Updated: 2026-04-07T15:17:10.337Z
Status : Analyzed
Published: 2026-04-06T18:16:43.830
Modified: 2026-04-20T18:33:23.027
Link: CVE-2026-35175
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:37:54Z
Github GHSA