Back to list

ShellHub has cross-tenant IDOR in `GET /api/sessions/:uid` that discloses SSH session data — CVE-2026-44423

GHSA · GitHub · CVE-2026-44423

ID
CVE-2026-44423
Date
Updated
Activity
Source
GHSA
Vendor
GitHub
Threat
medium
CVSS
6.5

Summary

## Summary `GET /api/sessions/:uid` returns the full session object for any authenticated caller, without scoping by the caller's tenant. An authenticated user can read session records (SSH username, device UID, remote IP, terminal type, authenticated flag, timestamps) belonging to any other namespace. ## Severity **CVSS 3.1: 7.5 (High)** CWE-639 ## Affected versions ShellHub Community v0.24.1 (by code inspection —…

Product

go: github.com/shellhub-io/shellhub

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories