CVE-2026-40177

HIGH

Password bypass when 2FA is activated

Title source: cna
STIX 2.1

Description

ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible to bypass the password authentication This vulnerability is fixed in 0.112.

Scores

CVSS v3 7.5
EPSS 0.0002
EPSS Percentile 5.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-287
Status published
Products (3)
ajenti/ajenti < 0.112
ajenti/ajenti_plugin_core < 0.112
pypi/ajenti.plugin.core 0 - 0.112PyPI
Published Apr 10, 2026
Tracked Since Apr 11, 2026