


Perceptive Security
SOC/SIEM Consultancy

Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located …
Published:
27 januari 2026 om 23:00:00
Alert date:
28 januari 2026 om 02:02:07
Source:
nvd.nist.gov
Cloud & Virtualization, Database & Storage
Dokploy, a self-hostable Platform as a Service (PaaS), contains a critical vulnerability in versions prior to 0.26.6 where the installation script uses hardcoded database credentials. The vulnerability is located in the install.sh script at line 154, causing nearly all Dokploy installations to use identical database credentials. This exposes all affected installations to potential compromise since attackers can easily access databases using the known hardcoded password. The issue has been patched in version 0.26.6.
Technical details
Mitigation steps:
Affected products:
Dokploy
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-24840
https://dokploy.com/install.sh
https://github.com/Dokploy/dokploy/commit/b902c160a256ad345ac687c87eb092f1fab2c64d
https://github.com/Dokploy/dokploy/security/advisories/GHSA-jr65-3j3w-gjmc
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
