CVE-2026-43633
HestiaCP 1.9.0-1.9.4 Deserialization RCE via Web Terminal
CVSS Score
10.0
EPSS Score
0.0%
EPSS Percentile
0th
HestiaCP versions 1.9.0 through 1.9.4 contain a deserialization vulnerability in the web terminal component caused by a session format mismatch between PHP and Node.js that allows unauthenticated remote attackers to achieve root-level code execution. Attackers can inject crafted data into HTTP headers that are processed by the PHP session handler but incorrectly deserialized by the Node.js web terminal component as trusted session values, resulting in arbitrary command execution on systems with the web terminal feature enabled.
| CWE | CWE-502 |
| Vendor | hestiacp |
| Product | hestiacp |
| Published | May 19, 2026 |
| Last Updated | May 19, 2026 |
Stay Ahead of the Next One
Get instant alerts for hestiacp hestiacp
Be the first to know when new critical vulnerabilities affecting hestiacp hestiacp are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
hestiacp / hestiacp
1.9.0 โค 1.9.4
References
mercuryiss.com.au: https://mercuryiss.com.au/hestiacp-unauthenticated-rce-ip-spoofing-cve-2026-43633-cve-2026-43634 github.com: https://github.com/hestiacp/hestiacp/issues/5229 github.com: https://github.com/hestiacp/hestiacp/pull/5244 github.com: https://github.com/hestiacp/hestiacp/commit/854d71b3c1737b0a0d0cc55c926008ffe1f6719b vulncheck.com: https://www.vulncheck.com/advisories/hestiacp-deserialization-rce-via-web-terminal
Credits
sutol divinity76