Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated, low-privileged user can run arbitrary OS commands on the Dokploy host. The tRPC procedure docker.getContainersByAppNameMatch interpolates the attacker-supplied appName value into a Docker CLI call without sanitisation, enabling command injection under the Dokploy service account. This vulnerability is fixed in 0.23.7.
History

Mon, 29 Sep 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Dokploy
Dokploy dokploy
CPEs cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*
Vendors & Products Dokploy
Dokploy dokploy
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00419}

epss

{'score': 0.00559}


Mon, 07 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 07 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Description Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated, low-privileged user can run arbitrary OS commands on the Dokploy host. The tRPC procedure docker.getContainersByAppNameMatch interpolates the attacker-supplied appName value into a Docker CLI call without sanitisation, enabling command injection under the Dokploy service account. This vulnerability is fixed in 0.23.7.
Title Dokploy allows attackers to run arbitrary OS commands on the Dokploy host.
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-07T15:55:34.637Z

Updated: 2025-07-07T16:14:22.091Z

Reserved: 2025-06-27T12:57:16.122Z

Link: CVE-2025-53376

cve-icon Vulnrichment

Updated: 2025-07-07T16:14:19.341Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-07T16:15:25.467

Modified: 2025-09-29T13:56:29.320

Link: CVE-2025-53376

cve-icon Redhat

No data.