CVE-2025-53376

8.8 HIGH

📋 TL;DR

CVE-2025-53376 is a command injection vulnerability in Dokploy that allows authenticated low-privileged users to execute arbitrary operating system commands on the host server. The vulnerability occurs when user-supplied input is improperly sanitized before being passed to Docker CLI commands. This affects all Dokploy instances with authenticated users.

💻 Affected Systems

Products:
  • Dokploy
Versions: All versions before 0.23.7
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to Dokploy with any user privileges. Docker must be installed and accessible to Dokploy.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the Dokploy host server, allowing attackers to install malware, exfiltrate data, pivot to other systems, or establish persistent backdoors.

🟠

Likely Case

Attackers gain shell access to the Dokploy host, potentially compromising all applications and databases managed by the platform.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are implemented, though the Dokploy service account would still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in a documented API endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.23.7

Vendor Advisory: https://github.com/Dokploy/dokploy/security/advisories/GHSA-m486-7pmj-8cmv

Restart Required: Yes

Instructions:

1. Backup your Dokploy configuration and data. 2. Stop the Dokploy service. 3. Update to version 0.23.7 using your deployment method (Docker, direct install, etc.). 4. Restart the Dokploy service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict User Access

all

Temporarily remove or disable all non-essential user accounts in Dokploy until patching can be completed.

Network Segmentation

all

Isolate the Dokploy host from other critical systems to limit potential lateral movement.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which users can reach the Dokploy interface
  • Monitor all Docker commands executed by the Dokploy service account for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check your Dokploy version. If it's below 0.23.7 and you have authenticated users, you are vulnerable.

Check Version:

docker exec dokploy dokploy --version or check the Dokploy web interface settings page

Verify Fix Applied:

After updating to 0.23.7, verify the version and test that the docker.getContainersByAppNameMatch endpoint properly sanitizes input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Docker commands from Dokploy service account
  • Multiple failed authentication attempts followed by successful login
  • Suspicious command execution in system logs

Network Indicators:

  • Unusual outbound connections from Dokploy host
  • Traffic to known malicious IPs from Dokploy host

SIEM Query:

source="dokploy" AND (event="docker_command" AND command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export