Description
Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated, low-privileged user can run arbitrary OS commands on the Dokploy host. The tRPC procedure docker.getContainersByAppNameMatch interpolates the attacker-supplied appName value into a Docker CLI call without sanitisation, enabling command injection under the Dokploy service account. This vulnerability is fixed in 0.23.7.
References (2)
Core 2
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/Dokploy/dokploy/security/advisories/GHSA-m486-7pmj-8cmv
Scores
CVSS v3
8.8
EPSS
0.0355
EPSS Percentile
87.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (1)
dokploy/dokploy
< 0.23.7
Published
Jul 07, 2025
Tracked Since
Feb 18, 2026