Cockpit CMS EUVD-2026-26232

| CVE-2026-38992 CRITICAL
Code Injection (CWE-94)
2026-04-29 mitre
9.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Source Code Evidence Fetched
Apr 30, 2026 - 16:22 vuln.today
Analysis Generated
Apr 30, 2026 - 16:22 vuln.today
CVSS changed
Apr 30, 2026 - 16:22 NVD
9.8 (None) 9.8 (CRITICAL)

DescriptionNVD

Cockpit v2.13.5 and earlier is vulnerable to arbitrary code execution via the filter parameter within multiple endpoints. This vulnerability allows an attacker to run system commands on the underlying infrastructure via the MongoLite $func operator.

AnalysisAI

Remote code execution in Cockpit CMS versions 2.13.5 and earlier allows unauthenticated attackers to execute arbitrary system commands on the server by injecting malicious payloads through the filter parameter across multiple endpoints. The vulnerability exploits the MongoLite database layer's $func operator, which processes user-controlled input as executable code. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all Cockpit CMS deployments and document versions in use; immediately isolate affected instances from production networks or restrict inbound access to trusted sources only. Within 7 days: Evaluate migration to alternative CMS platforms or implement Web Application Firewall (WAF) rules blocking requests containing suspicious MongoLite $func operator syntax in filter parameters across all endpoints. …

Sign in for detailed remediation steps.

Share

EUVD-2026-26232 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy