Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)
Ajenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.
Ajenti is a web-based system administration panel. Prior to version 2.2.15, a flaw exists in the auth_users authentication plugin that permits authenticated users lacking superuser privileges to install custom packages. This vulnerability, identified as CVE-2026-35175, allows a low-privileged user to bypass intended authorization checks, potentially escalating their privileges and compromising the entire system. An attacker could leverage this vulnerability to install malicious packages, execute arbitrary code with elevated privileges, and gain unauthorized access to sensitive data or system functionalities. Organizations using vulnerable versions of Ajenti are at risk of internal privilege escalation attacks.
Attack Chain
- An attacker gains initial access to the Ajenti web panel with a valid, non-superuser account using the
auth_usersplugin. - The attacker navigates to the custom package installation feature within the Ajenti web interface.
- The attacker uploads a malicious custom package designed to execute arbitrary commands or install backdoors.
- Ajenti fails to properly validate the user’s privileges before initiating the package installation process.
- The malicious package is installed with the privileges of the Ajenti process, which may include elevated permissions.
- The malicious package executes its payload, potentially installing a reverse shell, creating new administrative accounts, or modifying critical system files.
- The attacker leverages the installed backdoor or elevated privileges to gain persistent access to the system.
Impact
Successful exploitation of this vulnerability allows an authenticated, non-superuser user to execute arbitrary code with elevated privileges. This can lead to full system compromise, data theft, and disruption of services. While the precise number of affected installations is unknown, any organization running Ajenti versions prior to 2.2.15 with the auth_users authentication plugin enabled is vulnerable. The impact includes potential data breaches, system downtime, and reputational damage.
Recommendation
- Immediately upgrade Ajenti to version 2.2.15 or later to patch CVE-2026-35175 (see References).
- Implement the Sigma rule
Detect Suspicious Ajenti Package Installationto detect unauthorized package installations. - Review Ajenti access logs for unusual activity or attempts to access restricted functionalities.
Detection coverage 2
Detect Suspicious Ajenti Package Installation
highDetects potential exploitation of Ajenti authorization bypass vulnerability through monitoring of custom package installations.
Detect Unauthorized Package Installation via Auth Bypass
mediumDetects unauthorized package installations in Ajenti, indicative of a potential auth bypass. This will need tuning to account for authorized users who can install packages.
Detection queries are kept inside the platform. Get full rules →