Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8647-755q-fw9p | ajenti.plugin.core has race conditions in 2FA |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ajenti ajenti Plugin Core
|
|
| CPEs | cpe:2.3:a:ajenti:ajenti_plugin_core:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ajenti ajenti Plugin Core
|
|
| Metrics |
cvssV3_1
|
Mon, 13 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ajenti
Ajenti ajenti |
|
| Vendors & Products |
Ajenti
Ajenti ajenti |
Fri, 10 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible during a short moment after the authentication of an user to bypass its authentication. This vulnerability is fixed in 0.112. | |
| Title | ajenti.plugin.core has a race conditions in 2FA | |
| Weaknesses | CWE-287 CWE-362 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-14T03:55:43.193Z
Reserved: 2026-04-09T20:59:17.619Z
Link: CVE-2026-40178
Updated: 2026-04-13T15:33:22.717Z
Status : Analyzed
Published: 2026-04-10T20:16:23.117
Modified: 2026-04-21T19:29:55.867
Link: CVE-2026-40178
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:57:32Z
Github GHSA