Vulnerability Description
Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amirraminfar | Dozzle | < 9.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/amir20/dozzle/commit/620e59aa246347ba8a27e68c532853b8a5137bc1Patch
- https://github.com/amir20/dozzle/releases/tag/v9.0.3ProductRelease Notes
- https://github.com/amir20/dozzle/security/advisories/GHSA-m855-r557-5rc5ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-24740?
CVE-2026-24740 is a vulnerability with a CVSS score of 9.9 (CRITICAL). Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) ...
How severe is CVE-2026-24740?
CVE-2026-24740 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-24740?
Check the references section above for vendor advisories and patch information. Affected products include: Amirraminfar Dozzle.