NIXPKGS-2026-1001
GitHub issue
published on
Permalink
CVE-2026-4631
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
4 packages
- cockpit-zfs
- cockpit-files
- cockpit-podman
- cockpit-machines
- @LeSuisse accepted
- @LeSuisse published on GitHub
Cockpit: cockpit: unauthenticated remote code execution due to ssh command-line argument injection
Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
References
Ignored references (1)
Affected products
cockpit
Matching in nixpkgs
Ignored packages (4)
pkgs.cockpit-zfs
Cockpit plugin for ZFS management by 45Drives
pkgs.cockpit-files
Featureful file browser for Cockpit
pkgs.cockpit-podman
Cockpit UI for podman containers
pkgs.cockpit-machines
Cockpit UI for virtual machines
Package maintainers
-
@lucasew Lucas Eduardo Wendt <lucas59356@gmail.com>