CVE-2025-53375

Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated attacker can read any file that the Traefik process user can access (e.g., /etc/passwd, application source, environment variable files containing credentials and secrets). This may lead to full compromise of other services or lateral movement. This vulnerability is fixed in 0.23.7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*

History

29 Sep 2025, 13:55

Type Values Removed Values Added
References () https://github.com/Dokploy/dokploy/commit/e42f6bc61050cd438726921fced64477cbf8f8e6 - () https://github.com/Dokploy/dokploy/commit/e42f6bc61050cd438726921fced64477cbf8f8e6 - Patch
References () https://github.com/Dokploy/dokploy/security/advisories/GHSA-vq94-qm94-mxp6 - () https://github.com/Dokploy/dokploy/security/advisories/GHSA-vq94-qm94-mxp6 - Patch, Third Party Advisory
First Time Dokploy
Dokploy dokploy
CPE cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

07 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-07 16:15

Updated : 2025-09-29 13:55


NVD link : CVE-2025-53375

Mitre link : CVE-2025-53375

CVE.ORG link : CVE-2025-53375


JSON object : View

Products Affected

dokploy

  • dokploy
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')