No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 29 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary PHP File Rename Enabling Server‑Side Code Execution in Cockpit CMS | |
| Weaknesses | CWE-20 CWE-73 |
Wed, 29 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
cvssV3_1
|
Wed, 29 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cockpit-hq
Cockpit-hq cockpit |
|
| Vendors & Products |
Cockpit-hq
Cockpit-hq cockpit |
Wed, 29 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cockpit 2.13.5 and earlier is affected by a misconfiguration within the Bucket component _isFileTypeAllowed function where a specially crafted filename bypasses an extension filter. This allows an authenticated attacker to rename arbitrary files with the .php file extension enabling arbitrary code to be executed on the underlying server. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-29T20:23:41.211Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38991
Updated: 2026-04-29T20:21:38.753Z
Status : Deferred
Published: 2026-04-29T16:16:23.797
Modified: 2026-04-29T21:22:20.120
Link: CVE-2026-38991
No data.
OpenCVE Enrichment
Updated: 2026-04-29T21:30:20Z