CRITICALVulnerability
Verified
Global

NVD CRITICAL: CVE-2026-4631 — Cockpit's remote login feature passes user-supplied hostnames and usernames from...

Tuesday, April 7, 2026 at 05:16 PM UTC·Source: NIST NVD

Updated: Tuesday, April 7, 2026 at 05:17 PM UTC

Executive Summary

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The inje

Analysis

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability. CVSS Score: 9.8. Published: 2026-04-07T17:16:38.010.

Indicators of Compromise (1)

CVE (1)
CVE-2026-4631
Source Attribution

Originally published by NIST NVD on Apr 7, 2026. Verified by: NIST.

Related Threats