Remote Code Execution Vulnerability in Cockpit Web Service by Red Hat
CVE-2026-4631

9.8CRITICAL

What is CVE-2026-4631?

The Cockpit web service's remote login feature is susceptible to a serious vulnerability where it improperly processes user-supplied hostnames and usernames. This lack of validation allows an attacker with network access to manipulate HTTP requests to the login endpoint. As a result, malicious SSH options or shell commands can be injected, permitting code execution on the Cockpit host without any need for valid credentials. The vulnerability arises within the authentication flow, preceding any checks on credentials, thereby enabling access and execution of unauthorized commands.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Florian Kohnhäuser for reporting this issue.
.