Description
HestiaCP versions 1.9.0 through 1.9.4 contain a deserialization vulnerability in the web terminal component caused by a session format mismatch between PHP and Node.js that allows unauthenticated remote attackers to achieve root-level code execution. Attackers can inject crafted data into HTTP headers that are processed by the PHP session handler but incorrectly deserialized by the Node.js web terminal component as trusted session values, resulting in arbitrary command execution on systems with the web terminal feature enabled.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
1.9.0 (semver)
854d71b3c1737b0a0d0cc55c926008ffe1f6719b (git)
Credits
sutol
divinity76
References
mercuryiss.com.au/...-spoofing-cve-2026-43633-cve-2026-43634
github.com/hestiacp/hestiacp/issues/5229
github.com/hestiacp/hestiacp/pull/5244
github.com/...ommit/854d71b3c1737b0a0d0cc55c926008ffe1f6719b
www.vulncheck.com/...cp-deserialization-rce-via-web-terminal