| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3mcx-6wxm-qr8v | ajenti.plugin.core has password bypass when 2FA is activated |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 14 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ajenti
Ajenti ajenti |
|
| Vendors & Products |
Ajenti
Ajenti ajenti |
Fri, 10 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible to bypass the password authentication This vulnerability is fixed in 0.112. | |
| Title | Password bypass when 2FA is activated | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-14T13:26:56.925Z
Reserved: 2026-04-09T20:59:17.619Z
Link: CVE-2026-40177
Updated: 2026-04-14T13:26:53.879Z
Status : Awaiting Analysis
Published: 2026-04-10T20:16:22.970
Modified: 2026-04-13T15:02:06.187
Link: CVE-2026-40177
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:57:33Z
Github GHSA