CVE-2026-44423 PUBLISHED

ShellHub: Cross-tenant IDOR in `GET /api/sessions/:uid` discloses SSH session data

Assigner: GitHub_M
Reserved: 06.05.2026 Published: 13.05.2026 Updated: 13.05.2026

ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET /api/sessions/:uid returns the full session object for any authenticated caller, without scoping by the caller's tenant. An authenticated user can read session records (SSH username, device UID, remote IP, terminal type, authenticated flag, timestamps) belonging to any other namespace. This vulnerability is fixed in 0.24.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 6.5

Product Status

Vendor shellhub-io
Product shellhub
Versions
  • Version < 0.24.2 is affected

References

Problem Types

  • CWE-639: Authorization Bypass Through User-Controlled Key CWE