Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9w9c-9w8m-w89q | ShellHub has cross-tenant IDOR in `GET /api/sessions/:uid` that discloses SSH session data |
Fri, 15 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shellhub
Shellhub shellhub |
|
| CPEs | cpe:2.3:a:shellhub:shellhub:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Shellhub
Shellhub shellhub |
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shellhub-io
Shellhub-io shellhub |
|
| Vendors & Products |
Shellhub-io
Shellhub-io shellhub |
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET /api/sessions/:uid returns the full session object for any authenticated caller, without scoping by the caller's tenant. An authenticated user can read session records (SSH username, device UID, remote IP, terminal type, authenticated flag, timestamps) belonging to any other namespace. This vulnerability is fixed in 0.24.2. | |
| Title | ShellHub: Cross-tenant IDOR in `GET /api/sessions/:uid` discloses SSH session data | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T12:50:40.262Z
Reserved: 2026-05-06T14:40:00.953Z
Link: CVE-2026-44423
Updated: 2026-05-14T12:47:58.084Z
Status : Analyzed
Published: 2026-05-13T22:16:44.103
Modified: 2026-05-15T17:16:32.790
Link: CVE-2026-44423
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:11Z
Github GHSA