CVE-2026-43633 PUBLISHED

HestiaCP 1.9.0-1.9.4 Deserialization RCE via Web Terminal

Assigner: VulnCheck
Reserved: 01.05.2026 Published: 19.05.2026 Updated: 19.05.2026

HestiaCP versions 1.9.0 through 1.9.4 contain a deserialization vulnerability in the web terminal component caused by a session format mismatch between PHP and Node.js that allows unauthenticated remote attackers to achieve root-level code execution. Attackers can inject crafted data into HTTP headers that are processed by the PHP session handler but incorrectly deserialized by the Node.js web terminal component as trusted session values, resulting in arbitrary command execution on systems with the web terminal feature enabled.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.5

Product Status

Vendor hestiacp
Product hestiacp
Versions Default: affected
  • affected from 1.9.0 to 1.9.4 (incl.)
  • Version 854d71b3c1737b0a0d0cc55c926008ffe1f6719b is unaffected

Credits

  • sutol finder
  • divinity76 remediation developer

References

Problem Types

  • CWE-502 Deserialization of Untrusted Data CWE