Skip to content

An authenticated, low-privileged user without belonging to any organisation can run arbitrary OS commands on the Dokploy host.

Moderate
Siumauricio published GHSA-m486-7pmj-8cmv Jul 5, 2025

Package

docker dokploy/dokploy (docker)

Affected versions

< 0.23.6

Patched versions

0.23.7

Description

Impact

An authenticated, low-privileged user without belonging to any organisation can run
arbitrary OS commands on the Dokploy host. The tRPC procedure
docker.getContainersByAppNameMatch interpolates the attacker-supplied appName
value into a Docker CLI call without sanitisation, enabling command injection under the
Dokploy service account.

Patches

v0.23.7

Severity

Moderate

CVE ID

CVE-2025-53376

Weaknesses

No CWEs

Credits