CVE-2026-44425 PUBLISHED

ShellHub: Crash-DoS via field injection in filter and sort-by parameters

Assigner: GitHub_M
Reserved: 06.05.2026 Published: 13.05.2026 Updated: 13.05.2026

ShellHub is a centralized SSH gateway. Prior to 0.24.2, the device list endpoint accepts user-controlled identifiers in the the name field of each filter property in the base64-encoded filter query parameter and the sort_by query parameter, which are then passed directly as BSON/SQL keys in the database layer without validation. Any authenticated user can craft payloads that cause the aggregation / query to fail and the API to return HTTP 500 with no body, with no rate limiting applied. This vulnerability is fixed in 0.24.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
CVSS Score: 5.4

Product Status

Vendor shellhub-io
Product shellhub
Versions
  • Version < 0.24.2 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE
  • CWE-943: Improper Neutralization of Special Elements in Data Query Logic CWE
  • CWE-1333: Inefficient Regular Expression Complexity CWE