Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue. | |
| Title | Dozzle Agent Label-Based Access Control Bypass Allows Unauthorized Container Shell Access | |
| Weaknesses | CWE-284 CWE-863 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-27T20:59:05.656Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24740
No data.
Status : Received
Published: 2026-01-27T21:16:03.277
Modified: 2026-01-27T21:16:03.277
Link: CVE-2026-24740
No data.
OpenCVE Enrichment
No data.