CVE-2026-27975

9.8 CRITICAL

📋 TL;DR

CVE-2026-27975 is an unauthenticated remote code execution vulnerability in Ajenti server admin panel. Attackers can execute arbitrary code on servers running vulnerable versions without authentication. This affects all Ajenti installations prior to version 2.2.13.

💻 Affected Systems

Products:
  • Ajenti
Versions: All versions prior to 2.2.13
Operating Systems: Linux, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: All Ajenti installations with default configuration are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to install malware, steal data, pivot to other systems, or establish persistent backdoors.

🟠

Likely Case

Attackers gain shell access to the server, install cryptocurrency miners, create unauthorized user accounts, or deploy ransomware.

🟢

If Mitigated

If properly segmented and monitored, impact limited to the Ajenti host with potential lateral movement prevented.

🌐 Internet-Facing: HIGH - Unauthenticated RCE on internet-facing admin panels provides direct attack vector.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation makes this particularly dangerous. While no public PoC exists, the advisory suggests straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.13

Vendor Advisory: https://github.com/ajenti/ajenti/security/advisories/GHSA-vcw3-r3fx-j444

Restart Required: Yes

Instructions:

1. Backup current Ajenti configuration. 2. Stop Ajenti service. 3. Update Ajenti to version 2.2.13 using package manager or manual installation. 4. Restart Ajenti service. 5. Verify version is 2.2.13 or higher.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Ajenti panel to trusted IP addresses only

iptables -A INPUT -p tcp --dport 8000 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 8000 -j DROP

Service Disablement

linux

Temporarily disable Ajenti service until patching can be completed

systemctl stop ajenti
systemctl disable ajenti

🧯 If You Can't Patch

  • Isolate Ajenti server from internet and restrict internal network access
  • Implement strict network monitoring and alerting for suspicious activity on Ajenti port

🔍 How to Verify

Check if Vulnerable:

Check Ajenti version via web interface or command line. If version is below 2.2.13, system is vulnerable.

Check Version:

ajenti-panel --version

Verify Fix Applied:

Confirm Ajenti version is 2.2.13 or higher and test that unauthenticated access does not allow code execution.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to admin endpoints
  • Unusual process execution from Ajenti user
  • Failed authentication logs followed by successful access

Network Indicators:

  • Unusual outbound connections from Ajenti server
  • Traffic to Ajenti port from unexpected sources

SIEM Query:

source="ajenti.log" AND ("unauthenticated" OR "unauthorized") AND ("exec" OR "command" OR "shell")

🔗 References

📤 Share & Export