Home

Description

ShellHub is a centralized SSH gateway. Prior to 0.24.2, the device list endpoint accepts user-controlled identifiers in the the name field of each filter property in the base64-encoded filter query parameter and the sort_by query parameter, which are then passed directly as BSON/SQL keys in the database layer without validation. Any authenticated user can craft payloads that cause the aggregation / query to fail and the API to return HTTP 500 with no body, with no rate limiting applied. This vulnerability is fixed in 0.24.2.

PUBLISHED Reserved 2026-05-06 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

Problem types

CWE-20: Improper Input Validation

CWE-943: Improper Neutralization of Special Elements in Data Query Logic

CWE-1333: Inefficient Regular Expression Complexity

Product status

< 0.24.2
affected

References

github.com/...ellhub/security/advisories/GHSA-47r2-v3x6-wff9

cve.org (CVE-2026-44425)

nvd.nist.gov (CVE-2026-44425)

Download JSON