Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fm6c-rhcf-7439 | Cockpit is vulnerable to arbitrary code execution |
Sat, 02 May 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cockpit CMS Arbitrary Code Execution via MongoLite $func Operator |
Fri, 01 May 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution in Cockpit CMS via Filter Parameter | |
| Weaknesses | CWE-78 |
Thu, 30 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 29 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution in Cockpit CMS via Filter Parameter | |
| Weaknesses | CWE-78 CWE-94 |
Wed, 29 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cockpit-hq
Cockpit-hq cockpit |
|
| Vendors & Products |
Cockpit-hq
Cockpit-hq cockpit |
Wed, 29 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cockpit v2.13.5 and earlier is vulnerable to arbitrary code execution via the filter parameter within multiple endpoints. This vulnerability allows an attacker to run system commands on the underlying infrastructure via the MongoLite $func operator. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-30T15:22:49.472Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38992
Updated: 2026-04-30T13:03:39.426Z
Status : Deferred
Published: 2026-04-29T15:16:05.750
Modified: 2026-04-30T16:16:43.683
Link: CVE-2026-38992
No data.
OpenCVE Enrichment
Updated: 2026-05-02T00:45:30Z
Github GHSA