Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
History

Tue, 27 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Description Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
Title Dozzle Agent Label-Based Access Control Bypass Allows Unauthorized Container Shell Access
Weaknesses CWE-284
CWE-863
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T20:59:05.656Z

Reserved: 2026-01-26T19:06:16.059Z

Link: CVE-2026-24740

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-27T21:16:03.277

Modified: 2026-01-27T21:16:03.277

Link: CVE-2026-24740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.