Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24740: CWE-284: Improper Access Control in amir20 dozzle

0
High
VulnerabilityCVE-2026-24740cvecve-2026-24740cwe-284cwe-863
Published: Tue Jan 27 2026 (01/27/2026, 20:59:05 UTC)
Source: CVE Database V5
Vendor/Project: amir20
Product: dozzle

Description

CVE-2026-24740 is a high-severity improper access control vulnerability in Dozzle, a realtime log viewer for Docker containers. Versions prior to 9. 0. 3 allow users restricted by label filters to bypass these restrictions and obtain an interactive root shell in containers outside their authorized scope by directly targeting container IDs. This flaw enables privilege escalation within the same host, potentially compromising container integrity and confidentiality. The vulnerability requires no user interaction and can be exploited remotely over the network with low complexity. Although no known exploits are currently in the wild, affected users should upgrade to Dozzle 9. 0. 3 immediately to mitigate risk. European organizations using Dozzle in containerized environments are at risk, especially those with multi-tenant or segmented container deployments.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:14:25 UTC

Technical Analysis

CVE-2026-24740 is an improper access control vulnerability (CWE-284) in Dozzle, a realtime log viewer for Docker containers developed by amir20. The vulnerability exists in Dozzle versions prior to 9.0.3 and relates to its agent-backed shell endpoints. Dozzle supports filtering container access based on labels (e.g., `label=env=dev`) to restrict users to specific containers. However, due to insufficient validation, a user restricted by such label filters can bypass these restrictions by directly specifying container IDs of out-of-scope containers (e.g., containers labeled `env=prod`). This allows the attacker to obtain an interactive root shell inside unauthorized containers running on the same host. The flaw effectively breaks container isolation enforced by Dozzle’s filtering mechanism, enabling privilege escalation and lateral movement within the host environment. The vulnerability is remotely exploitable over the network without requiring user interaction or elevated privileges beyond those granted by label filters. The CVSS 4.0 base score is 8.7 (high severity) reflecting the network attack vector, low attack complexity, no user interaction, and high impact on confidentiality and integrity due to root shell access. Although no public exploits are reported, the vulnerability poses a significant risk to containerized environments relying on Dozzle for log viewing and shell access. The issue was patched in Dozzle version 9.0.3 by correcting the access control checks on shell endpoints to enforce label restrictions properly.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized access to sensitive container workloads, potentially exposing confidential data and allowing attackers to manipulate or disrupt critical applications. Organizations using Dozzle in multi-tenant or segmented environments risk cross-container attacks, undermining container isolation and increasing the attack surface. This can result in data breaches, service disruptions, and lateral movement within internal networks. Industries with strict data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened risks due to potential exposure of regulated data. The ability to gain root shell access without user interaction or elevated privileges makes this vulnerability particularly dangerous in automated or large-scale container deployments common in European enterprises. Additionally, the vulnerability could facilitate further attacks on the host system or connected infrastructure, amplifying the impact.

Mitigation Recommendations

1. Upgrade Dozzle to version 9.0.3 or later immediately to apply the official patch that enforces proper access control on shell endpoints. 2. Review and tighten container label policies to ensure minimal privileges are granted and labels accurately reflect access boundaries. 3. Implement network segmentation and firewall rules to restrict access to Dozzle’s agent endpoints only to trusted users and systems. 4. Monitor container shell access logs and audit trails for unusual or unauthorized interactive shell sessions, especially those targeting containers outside expected label scopes. 5. Employ container security tools that enforce runtime policies and detect privilege escalation attempts within containers. 6. Educate DevOps and security teams about the risks of improper access control in container management tools and encourage regular vulnerability scanning and patching. 7. Consider isolating critical containers on separate hosts or using additional container security layers to limit the impact of potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T19:06:16.059Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697928b74623b1157c47a0e4

Added to database: 1/27/2026, 9:05:59 PM

Last enriched: 2/4/2026, 9:14:25 AM

Last updated: 2/6/2026, 6:38:54 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats