Unrated severityOSV Advisory· Published Jan 19, 2026· Updated Jan 20, 2026
Tugtainer vulnerable to Password Exposure via URL Query Parameter
CVE-2026-23846
Description
Tugtainer is a self-hosted app for automating updates of Docker containers. In versions prior to 1.16.1, the password authentication mechanism transmits passwords via URL query parameters instead of the HTTP request body. This causes passwords to be logged in server access logs and potentially exposed through browser history, Referer headers, and proxy logs. Version 1.16.1 patches the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/Quenary/tugtainer/commit/9d23bf40ac1d39005582abfcf0a84753a4e29d52mitrex_refsource_MISC
- github.com/Quenary/tugtainer/security/advisories/GHSA-f2qf-f544-xm4pmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.