Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2859 articles · 109864 vulns · 38/41 feeds (7d)
← Back to list
9.8
CVE-2026-4631PATCHED
red hat · red hat enterprise linux

Cockpit: cockpit: unauthenticated remote code execution due to ssh command-line argument injection

Description

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.

Affected Products

VendorProductVersions
red hatred hat enterprise linux—

References

  • https://access.redhat.com/errata/RHSA-2026:7381(vendor-advisory, x_refsource_REDHAT)
  • https://access.redhat.com/errata/RHSA-2026:7382(vendor-advisory, x_refsource_REDHAT)
  • https://access.redhat.com/errata/RHSA-2026:7384(vendor-advisory, x_refsource_REDHAT)
  • https://access.redhat.com/security/cve/CVE-2026-4631(vdb-entry, x_refsource_REDHAT)
  • https://bugzilla.redhat.com/show_bug.cgi?id=2450246(issue-tracking, x_refsource_REDHAT)

Related News (2 articles)

Tier C
oss-security3h ago
CVE-2026-4631 [cockpit] Unauthenticated remote code execution due to SSH command-line argument injection
→ No new info (linked only)
Tier C
VulDB3d ago
CVE-2026-4631 | Cockpit Remote Login os command injection
→ No new info (linked only)
CVSS 3.19.8 NONE
CISA KEV❌ No
Actively exploited❌ No
Patch available
0:334.1-3.el10_00:344-2.el9_70:334.2-2.el9_6
CWECWE-78
PublishedApr 7, 2026
Last enriched2d agov2
Trending Score36
Source articles2
Independent2
Info Completeness7/14
Missing: versions, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-4634EXP
Keycloak: keycloak: denial of service via excessive processing of openid connect scope parameters
Trending: 41
HIGHCVE-2026-4636EXP
Keycloak: keycloak: uma policy bypass allows authenticated users to gain unauthorized access to victim-owned resources.
Trending: 39
NONECVE-2026-4282EXP
Keycloak: keycloak: privilege escalation via forged authorization codes due to singleuseobjectprovider isolation flaw
Trending: 33
NONECVE-2026-3872EXP
Keycloak: keycloak: information disclosure due to redirect_uri validation bypass
Trending: 33
NONECVE-2026-4878
Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()
Trending: 33

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 7, 2026
Discovered by ZDM
Apr 7, 2026
Updated: description
Apr 7, 2026
Patch Available
Apr 10, 2026

Version History

v2
Last enriched 2d ago
v2Tier C2d ago

Updated description with new details and confirmed no exploit is available.

description
via VulDB
v13d ago

Initial creation