{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T07:25:44.435","vulnerabilities":[{"cve":{"id":"CVE-2026-24839","sourceIdentifier":"security-advisories@github.com","published":"2026-01-28T01:16:14.490","lastModified":"2026-02-04T17:58:11.480","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, the Dokploy web interface is vulnerable to Clickjacking attacks due to missing frame-busting headers. This allows attackers to embed Dokploy pages in malicious iframes and trick authenticated users into performing unintended actions. Version 0.26.6 patches the issue."},{"lang":"es","value":"Dokploy es una Plataforma como Servicio (PaaS) gratuita y autoalojable. En versiones anteriores a la 0.26.6, la interfaz web de Dokploy es vulnerable a ataques de clickjacking debido a la ausencia de encabezados anti-frame. Esto permite a los atacantes incrustar páginas de Dokploy en iframes maliciosos y engañar a los usuarios autenticados para que realicen acciones no deseadas. La versión 0.26.6 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-1021"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*","versionEndExcluding":"0.26.6","matchCriteriaId":"D811B470-39CF-4FCD-A0A6-77EBBE229498"}]}]}],"references":[{"url":"https://github.com/Dokploy/dokploy/commit/9714695d5a78fe24496f989ab81807ba04699df8","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Dokploy/dokploy/pull/3500","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/Dokploy/dokploy/security/advisories/GHSA-c94j-8wgf-2q9q","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}