๐Ÿ” CVE Alert

CVE-2026-27130

CRITICAL 9.9

Dokploy has Command Injection in its Service Operations

CVSS Score
9.9
EPSS Score
0.2%
EPSS Percentile
48th

Dokploy is a free, self-hostable Platform as a Service (PaaS). Versions 0.26.6 and below have OS command injection through the appName parameter. 3 chained issues cause this problem: inadequate input sanitization, lack of schema validation and direct shell interpolation. User-controlled application names are passed through inadequate sanitization (cleanAppName function only replaces spaces and converts to lowercase) before being interpolated directly into shell commands executed via execAsync() and execAsyncRemote(). An authenticated attacker can inject shell metacharacters (e.g., ;, $(), backticks, |, &) in the appName field during application creation, which are then executed with server-level privileges when service operations (start, stop, remove, scale) are triggered. This issue has been resolved in version 0.26.7.

CWE CWE-78
Vendor dokploy
Product dokploy
Published May 18, 2026
Last Updated May 19, 2026
Stay Ahead of the Next One

Get instant alerts for dokploy dokploy

Be the first to know when new critical vulnerabilities affecting dokploy dokploy are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Dokploy / dokploy
< 0.26.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Dokploy/dokploy/security/advisories/GHSA-fcgq-jjfg-hrhj github.com: https://github.com/Dokploy/dokploy/commit/960892fd8dcf12b7a73a00edaa1b7090fca860c7