| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9w9c-9w8m-w89q | ShellHub has cross-tenant IDOR in `GET /api/sessions/:uid` that discloses SSH session data |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shellhub-io
Shellhub-io shellhub |
|
| Vendors & Products |
Shellhub-io
Shellhub-io shellhub |
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ShellHub is a centralized SSH gateway. Prior to 0.24.2, GET /api/sessions/:uid returns the full session object for any authenticated caller, without scoping by the caller's tenant. An authenticated user can read session records (SSH username, device UID, remote IP, terminal type, authenticated flag, timestamps) belonging to any other namespace. This vulnerability is fixed in 0.24.2. | |
| Title | ShellHub: Cross-tenant IDOR in `GET /api/sessions/:uid` discloses SSH session data | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T12:50:40.262Z
Reserved: 2026-05-06T14:40:00.953Z
Link: CVE-2026-44423
Updated: 2026-05-14T12:47:58.084Z
Status : Received
Published: 2026-05-13T22:16:44.103
Modified: 2026-05-14T13:16:19.637
Link: CVE-2026-44423
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:11Z
Github GHSA