Remote Code Execution Vulnerability in Cockpit Web Service by Red Hat
CVE-2026-4631
Key Information:
- Vendor
Red Hat
- Status
- Vendor
- CVE Published:
- 7 April 2026
Badges
What is CVE-2026-4631?
CVE-2026-4631 is a critical remote code execution vulnerability found in the Cockpit web service developed by Red Hat. Cockpit serves as a user-friendly interface for managing servers, allowing users to perform administrative tasks through a web browser. The vulnerability arises from the way Cockpit handles user-supplied hostnames and usernames when establishing remote login sessions via SSH. Specifically, the system fails to properly validate or sanitize these inputs, creating a significant security risk. An attacker with network access to the Cockpit web service could exploit this weakness by crafting a malicious HTTP request aimed at the login endpoint, allowing them to inject harmful SSH options or shell commands. This exploit can occur during the authentication flow, meaning that no valid credentials are required to execute arbitrary code on the Cockpit host, potentially compromising the integrity and confidentiality of the organization's systems.
Potential impact of CVE-2026-4631
-
Unauthorized Remote Code Execution: The most critical impact of CVE-2026-4631 is the ability for an attacker to execute arbitrary code on the affected system without needing valid authentication. This could allow them to take full control of the server, modify configurations, or install additional malware.
-
Data Breaches and Integrity Issues: Exploitation of the vulnerability can lead not only to unauthorized access but also to potential data breaches. Compromised systems may expose sensitive information, including user data and organizational assets, leading to significant legal and reputational repercussions.
-
Network Penetration and Lateral Movement: Given that the vulnerability allows code execution on the Cockpit host, attackers could leverage this access to further penetrate the internal network. They may move laterally to discover and compromise additional systems, expanding their control beyond the initially affected server.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Red Hat Enterprise Linux 10 0:344-3.el10_1
Red Hat Enterprise Linux 10.0 Extended Update Support 0:334.1-3.el10_0
Red Hat Enterprise Linux 9 0:344-2.el9_7
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved