Back to list

ShellHub has crash-DoS via field injection in filter and sort-by parameters — CVE-2026-44425

GHSA · GitHub · CVE-2026-44425

ID
CVE-2026-44425
Date
Updated
Activity
Source
GHSA
Vendor
GitHub
Threat
medium
CVSS
5.4

Summary

## Summary The device list endpoint accepts user-controlled identifiers in two places that are passed directly as BSON/SQL keys in the database layer without validation: 1. The `name` field of each filter property in the base64-encoded `filter` query parameter. 2. The `sort_by` query parameter. Any authenticated user can craft payloads that cause the aggregation/query to fail and the API to return HTTP 500 with no…

Product

go: github.com/shellhub-io/shellhub

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories