Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amir20
Amir20 dozzle |
|
| Vendors & Products |
Amir20
Amir20 dozzle |
Tue, 27 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue. | |
| Title | Dozzle Agent Label-Based Access Control Bypass Allows Unauthorized Container Shell Access | |
| Weaknesses | CWE-284 CWE-863 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-28T21:16:44.096Z
Reserved: 2026-01-26T19:06:16.059Z
Link: CVE-2026-24740
No data.
Status : Received
Published: 2026-01-27T21:16:03.277
Modified: 2026-01-27T21:16:03.277
Link: CVE-2026-24740
No data.