Cockpit v2.13.5 and earlier is vulnerable to arbitrary code execution via the filter parameter within multiple endpoints. This vulnerability allows an attacker to run system commands on the underlying infrastructure via the MongoLite $func operator.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 29 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution in Cockpit CMS via Filter Parameter | |
| Weaknesses | CWE-78 CWE-94 |
Wed, 29 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cockpit-hq
Cockpit-hq cockpit |
|
| Vendors & Products |
Cockpit-hq
Cockpit-hq cockpit |
Wed, 29 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cockpit v2.13.5 and earlier is vulnerable to arbitrary code execution via the filter parameter within multiple endpoints. This vulnerability allows an attacker to run system commands on the underlying infrastructure via the MongoLite $func operator. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-29T14:30:42.415Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38992
No data.
Status : Received
Published: 2026-04-29T15:16:05.750
Modified: 2026-04-29T15:16:05.750
Link: CVE-2026-38992
No data.
OpenCVE Enrichment
Updated: 2026-04-29T17:15:16Z