CVE-2026-39848
CSRF Vulnerability in Dockyard Allows Remote Container Control
Publication date: 2026-04-09
Last updated on: 2026-04-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dockyard | dockyard | to 1.1.0 (exc) |
| docker | docker | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring HTTP GET requests to the Dockyard container management application's action endpoint that perform start or stop operations on Docker containers without CSRF protection.
Specifically, look for GET requests to URLs matching the pattern: /apps/action.php?action=start&name=<container> or /apps/action.php?action=stop&name=<container>.
To detect exploitation attempts or presence of this vulnerability on your network or system, you can use network traffic inspection tools or web server logs to identify such GET requests.
Example commands to detect these requests include:
- Using tcpdump to capture HTTP GET requests containing 'action=start' or 'action=stop': tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -E 'GET /apps/action.php\?action=(start|stop)&name='
- Using grep on web server access logs to find suspicious GET requests: grep -E 'GET /apps/action.php\?action=(start|stop)&name=' /var/log/apache2/access.log
- Using curl to manually test if the endpoint accepts GET requests to start or stop containers (requires valid admin session cookie): curl -v --cookie 'session=your_admin_session_cookie' 'http://<dockyard_host>/apps/action.php?action=stop&name=<container>'
If such GET requests are accepted and cause container start/stop actions without requiring CSRF tokens, the system is vulnerable.
Can you explain this vulnerability to me?
This vulnerability exists in Dockyard, a Docker container management application, in versions prior to 1.1.0. The issue is that Docker container start and stop operations are performed through GET requests without any Cross-Site Request Forgery (CSRF) protection.
Because of this, a remote attacker can trick a logged-in administrator's browser into sending requests to start or stop Docker containers by accessing specific URLs, such as /apps/action.php?action=stop&name=<container> or /apps/action.php?action=start&name=<container>. This allows the attacker to control container operations without proper authorization.
The vulnerability was fixed in Dockyard version 1.1.0.
How can this vulnerability impact me? :
This vulnerability can allow a remote attacker to start or stop Docker containers without proper authorization by exploiting the lack of CSRF protection.
If an attacker successfully exploits this, they could disrupt services running inside the containers by stopping them or potentially cause unauthorized container operations by starting containers.
This could lead to service downtime, operational disruption, and potential loss of availability for applications managed by Dockyard.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade Dockyard to version 1.1.0 or later, where the issue has been fixed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows a remote attacker to perform unauthorized start and stop operations on Docker containers through CSRF attacks on a logged-in administrator's browser. Such unauthorized actions could potentially lead to disruption of services or unauthorized control over containerized environments.
While the CVE description does not explicitly mention compliance with standards like GDPR or HIPAA, the ability for an attacker to manipulate container operations without proper authorization could impact the confidentiality and integrity of systems handling sensitive data, which are key requirements under these regulations.
Therefore, organizations using affected versions of Dockyard may face increased risk of non-compliance with security controls mandated by standards such as GDPR and HIPAA if this vulnerability is exploited.