CVE-2026-4631: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Red Hat Red Hat Enterprise Linux 10
Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
AI Analysis
Technical Summary
The vulnerability CVE-2026-4631 affects the Cockpit remote login feature in Red Hat Enterprise Linux 9.6 and 10. It stems from improper neutralization of special elements used in OS command execution, specifically in the way Cockpit passes user-supplied hostnames and usernames from its web interface to the SSH client without adequate validation or sanitization. An attacker with network access can craft a specially crafted HTTP request to the login endpoint, injecting malicious SSH command-line arguments or shell commands. This leads to unauthenticated remote code execution on the host running Cockpit, as the injection happens before any authentication checks. The CVSS v3.1 base score is 9.8, reflecting critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Red Hat has issued official security advisories (RHSA-2026:7381 and RHSA-2026:7382) providing updated cockpit packages that fix this issue.
Potential Impact
Successful exploitation of this vulnerability allows an unauthenticated attacker with network access to the Cockpit web service to execute arbitrary code on the affected host. This can lead to full compromise of the system, including unauthorized access, data manipulation, and disruption of service. The vulnerability is critical due to the lack of authentication requirement and the ability to execute commands remotely.
Mitigation Recommendations
Red Hat has released official security updates for the cockpit package in Red Hat Enterprise Linux 9.6 and 10 to address CVE-2026-4631. Users should apply these updates promptly. Before applying the update, ensure all previously released errata relevant to the system have been applied. Detailed update instructions are available at https://access.redhat.com/articles/11258. No alternative mitigations or workarounds are indicated in the vendor advisory. Applying the official patch fully mitigates the vulnerability.
CVE-2026-4631: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Red Hat Red Hat Enterprise Linux 10
Description
Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-4631 affects the Cockpit remote login feature in Red Hat Enterprise Linux 9.6 and 10. It stems from improper neutralization of special elements used in OS command execution, specifically in the way Cockpit passes user-supplied hostnames and usernames from its web interface to the SSH client without adequate validation or sanitization. An attacker with network access can craft a specially crafted HTTP request to the login endpoint, injecting malicious SSH command-line arguments or shell commands. This leads to unauthenticated remote code execution on the host running Cockpit, as the injection happens before any authentication checks. The CVSS v3.1 base score is 9.8, reflecting critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Red Hat has issued official security advisories (RHSA-2026:7381 and RHSA-2026:7382) providing updated cockpit packages that fix this issue.
Potential Impact
Successful exploitation of this vulnerability allows an unauthenticated attacker with network access to the Cockpit web service to execute arbitrary code on the affected host. This can lead to full compromise of the system, including unauthorized access, data manipulation, and disruption of service. The vulnerability is critical due to the lack of authentication requirement and the ability to execute commands remotely.
Mitigation Recommendations
Red Hat has released official security updates for the cockpit package in Red Hat Enterprise Linux 9.6 and 10 to address CVE-2026-4631. Users should apply these updates promptly. Before applying the update, ensure all previously released errata relevant to the system have been applied. Detailed update instructions are available at https://access.redhat.com/articles/11258. No alternative mitigations or workarounds are indicated in the vendor advisory. Applying the official patch fully mitigates the vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2026-03-23T08:25:21.305Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://access.redhat.com/security/cve/CVE-2026-4631","vendor":"Red Hat"}]
Threat ID: 69d534e5aaed68159a357dd4
Added to database: 4/7/2026, 4:46:29 PM
Last enriched: 5/15/2026, 9:24:23 AM
Last updated: 5/22/2026, 9:31:22 PM
Views: 220
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.