๐Ÿ” CVE Alert

CVE-2026-43633

CRITICAL 10.0

HestiaCP 1.9.0-1.9.4 Deserialization RCE via Web Terminal

CVSS Score
10.0
EPSS Score
0.0%
EPSS Percentile
0th

HestiaCP versions 1.9.0 through 1.9.4 contain a deserialization vulnerability in the web terminal component caused by a session format mismatch between PHP and Node.js that allows unauthenticated remote attackers to achieve root-level code execution. Attackers can inject crafted data into HTTP headers that are processed by the PHP session handler but incorrectly deserialized by the Node.js web terminal component as trusted session values, resulting in arbitrary command execution on systems with the web terminal feature enabled.

CWE CWE-502
Vendor hestiacp
Product hestiacp
Published May 19, 2026
Last Updated May 19, 2026
Stay Ahead of the Next One

Get instant alerts for hestiacp hestiacp

Be the first to know when new critical vulnerabilities affecting hestiacp hestiacp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

hestiacp / hestiacp
1.9.0 โ‰ค 1.9.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
mercuryiss.com.au: https://mercuryiss.com.au/hestiacp-unauthenticated-rce-ip-spoofing-cve-2026-43633-cve-2026-43634 github.com: https://github.com/hestiacp/hestiacp/issues/5229 github.com: https://github.com/hestiacp/hestiacp/pull/5244 github.com: https://github.com/hestiacp/hestiacp/commit/854d71b3c1737b0a0d0cc55c926008ffe1f6719b vulncheck.com: https://www.vulncheck.com/advisories/hestiacp-deserialization-rce-via-web-terminal

Credits

sutol divinity76