CVE-2026-39848
Received Received - Intake
CSRF Vulnerability in Dockyard Allows Remote Container Control

Publication date: 2026-04-09

Last updated on: 2026-04-10

Assigner: GitHub, Inc.

Description
Dockyard is a Docker container management app. Prior to 1.1.0, Docker container start and stop operations are performed through GET requests without CSRF protection. A remote attacker can cause a logged-in administrator's browser to request /apps/action.php?action=stop&name=<container> or /apps/action.php?action=start&name=<container>, which starts or stops the target container. This vulnerability is fixed in 1.1.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dockyard dockyard to 1.1.0 (exc)
docker docker *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP GET requests to the Dockyard container management application's action endpoint that perform start or stop operations on Docker containers without CSRF protection.

Specifically, look for GET requests to URLs matching the pattern: /apps/action.php?action=start&name=<container> or /apps/action.php?action=stop&name=<container>.

To detect exploitation attempts or presence of this vulnerability on your network or system, you can use network traffic inspection tools or web server logs to identify such GET requests.

Example commands to detect these requests include:

  • Using tcpdump to capture HTTP GET requests containing 'action=start' or 'action=stop': tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -E 'GET /apps/action.php\?action=(start|stop)&name='
  • Using grep on web server access logs to find suspicious GET requests: grep -E 'GET /apps/action.php\?action=(start|stop)&name=' /var/log/apache2/access.log
  • Using curl to manually test if the endpoint accepts GET requests to start or stop containers (requires valid admin session cookie): curl -v --cookie 'session=your_admin_session_cookie' 'http://<dockyard_host>/apps/action.php?action=stop&name=<container>'

If such GET requests are accepted and cause container start/stop actions without requiring CSRF tokens, the system is vulnerable.


Can you explain this vulnerability to me?

This vulnerability exists in Dockyard, a Docker container management application, in versions prior to 1.1.0. The issue is that Docker container start and stop operations are performed through GET requests without any Cross-Site Request Forgery (CSRF) protection.

Because of this, a remote attacker can trick a logged-in administrator's browser into sending requests to start or stop Docker containers by accessing specific URLs, such as /apps/action.php?action=stop&name=<container> or /apps/action.php?action=start&name=<container>. This allows the attacker to control container operations without proper authorization.

The vulnerability was fixed in Dockyard version 1.1.0.


How can this vulnerability impact me? :

This vulnerability can allow a remote attacker to start or stop Docker containers without proper authorization by exploiting the lack of CSRF protection.

If an attacker successfully exploits this, they could disrupt services running inside the containers by stopping them or potentially cause unauthorized container operations by starting containers.

This could lead to service downtime, operational disruption, and potential loss of availability for applications managed by Dockyard.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Dockyard to version 1.1.0 or later, where the issue has been fixed.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows a remote attacker to perform unauthorized start and stop operations on Docker containers through CSRF attacks on a logged-in administrator's browser. Such unauthorized actions could potentially lead to disruption of services or unauthorized control over containerized environments.

While the CVE description does not explicitly mention compliance with standards like GDPR or HIPAA, the ability for an attacker to manipulate container operations without proper authorization could impact the confidentiality and integrity of systems handling sensitive data, which are key requirements under these regulations.

Therefore, organizations using affected versions of Dockyard may face increased risk of non-compliance with security controls mandated by standards such as GDPR and HIPAA if this vulnerability is exploited.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart