No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 29 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution in Cockpit CMS via Filter Parameter | |
| Weaknesses | CWE-78 CWE-94 |
Wed, 29 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cockpit-hq
Cockpit-hq cockpit |
|
| Vendors & Products |
Cockpit-hq
Cockpit-hq cockpit |
Wed, 29 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cockpit v2.13.5 and earlier is vulnerable to arbitrary code execution via the filter parameter within multiple endpoints. This vulnerability allows an attacker to run system commands on the underlying infrastructure via the MongoLite $func operator. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-30T15:22:49.472Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38992
Updated: 2026-04-30T13:03:39.426Z
Status : Deferred
Published: 2026-04-29T15:16:05.750
Modified: 2026-04-30T16:16:43.683
Link: CVE-2026-38992
No data.
OpenCVE Enrichment
Updated: 2026-04-29T17:15:16Z