Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated attacker can read any file that the Traefik process user can access (e.g., /etc/passwd, application source, environment variable files containing credentials and secrets). This may lead to full compromise of other services or lateral movement. This vulnerability is fixed in 0.23.7.
References
Link | Resource |
---|---|
https://github.com/Dokploy/dokploy/commit/e42f6bc61050cd438726921fced64477cbf8f8e6 | Patch |
https://github.com/Dokploy/dokploy/security/advisories/GHSA-vq94-qm94-mxp6 | Patch Third Party Advisory |
Configurations
History
29 Sep 2025, 13:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Dokploy/dokploy/commit/e42f6bc61050cd438726921fced64477cbf8f8e6 - Patch | |
References | () https://github.com/Dokploy/dokploy/security/advisories/GHSA-vq94-qm94-mxp6 - Patch, Third Party Advisory | |
First Time |
Dokploy
Dokploy dokploy |
|
CPE | cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
07 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-07 16:15
Updated : 2025-09-29 13:55
NVD link : CVE-2025-53375
Mitre link : CVE-2025-53375
CVE.ORG link : CVE-2025-53375
JSON object : View
Products Affected
dokploy
- dokploy
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')