CVE ReportsDocker API Path Traversal in Beszel Agent via Unsanitized Input Vulnerability ID:...
Vulnerability ID: CVE-2026-27734
CVSS Score: 6.5
Published: 2026-02-27
A path traversal vulnerability exists in the Beszel server monitoring agent, allowing authenticated users to access arbitrary Docker Engine API endpoints. The vulnerability arises from improper sanitization of the 'container' query parameter when constructing requests to the Docker Unix socket. By injecting directory traversal sequences, an attacker with minimum privileges (including Read-Only) can escape the intended container scope and query sensitive host-level information, such as the Docker version, system info, or details of other containers running on the host.
Beszel agents prior to v0.18.4 fail to sanitize container IDs before passing them to the Docker socket. Authenticated users can use '../' sequences to traverse the Docker API and access unauthorized system information.
0.18.4)fix: prevent path traversal in docker container api
@@ -10,6 +10,8 @@
"net/http"
"net/url"
+ "regexp"
"github.com/henrygd/beszel/internal/agent"
)
+var containerIDPattern = regexp.MustCompile(`^[a-fA-F0-9]{12,64}$`)
+
func (h *Hub) ProxyDockerRequest(w http.ResponseWriter, r *http.Request) {
Remediation Steps:
/api/beszel/containers containing .. sequences to identify past exploitation attempts.Read the full report for CVE-2026-27734 on our website for more details including interactive diagrams and full exploit analysis.