Ajenti

3 CVEs product

Monthly

CVE-2026-40178 MEDIUM PATCH GHSA This Month

Remote authentication bypass in Ajenti prior to version 0.112 allows unauthenticated network attackers to circumvent two-factor authentication during a brief post-authentication window with high attack complexity. The vulnerability affects the core authentication mechanism in ajenti.plugin.core and permits attackers to gain high-confidence access to protected resources; the vendor released patched version 0.112 to resolve this issue.

Authentication Bypass Ajenti
NVD GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2026-40177 CRITICAL PATCH GHSA Act Now

Authentication bypass in Ajenti admin panel versions prior to 0.112 allows unauthenticated remote attackers to completely circumvent password authentication when two-factor authentication (2FA) is enabled. Attackers can gain full administrative access to the Ajenti server management interface without valid credentials, compromising confidentiality and integrity of managed systems. No public exploit identified at time of analysis.

Authentication Bypass Ajenti
NVD GitHub
CVSS 4.0
9.3
EPSS
0.1%
CVE-2026-27975 CRITICAL PATCH Act Now

Unauthenticated remote code execution in Ajenti server admin panel before 2.2.13. Unauthenticated users can gain full server access. Patch available.

Linux Ajenti
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-40178
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

Remote authentication bypass in Ajenti prior to version 0.112 allows unauthenticated network attackers to circumvent two-factor authentication during a brief post-authentication window with high attack complexity. The vulnerability affects the core authentication mechanism in ajenti.plugin.core and permits attackers to gain high-confidence access to protected resources; the vendor released patched version 0.112 to resolve this issue.

Authentication Bypass Ajenti
NVD GitHub
CVE-2026-40177
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

Authentication bypass in Ajenti admin panel versions prior to 0.112 allows unauthenticated remote attackers to completely circumvent password authentication when two-factor authentication (2FA) is enabled. Attackers can gain full administrative access to the Ajenti server management interface without valid credentials, compromising confidentiality and integrity of managed systems. No public exploit identified at time of analysis.

Authentication Bypass Ajenti
NVD GitHub
CVE-2026-27975
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Unauthenticated remote code execution in Ajenti server admin panel before 2.2.13. Unauthenticated users can gain full server access. Patch available.

Linux Ajenti
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy