Insufficient Input Validation in Beszel Server Monitoring Platform
CVE-2026-27734

6.5MEDIUM

Key Information:

Vendor

Henrygd

Status
Vendor
CVE Published:
27 February 2026

What is CVE-2026-27734?

The Beszel Server Monitoring Platform prior to version 0.18.2 is vulnerable due to insufficient validation of user-supplied input on authenticated API endpoints. Specifically, the endpoints GET /api/beszel/containers/logs and GET /api/beszel/containers/info improperly pass the 'container' parameter to the Docker agent without adequate validation. This design flaw allows authenticated users, even those with read-only permissions, to exploit URL paths and perform directory traversal attacks. By leveraging the raw parameter values, an attacker can access sensitive Docker API resources on the host machine, potentially disclosing critical infrastructure details. This issue has been addressed in version 0.18.4, which implements proper input validation measures.

Affected Version(s)

beszel < 0.18.4

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.