Browse all 4 CVE security advisories affecting runtipi. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Runtipi is a self-hosting platform that simplifies deploying web applications using Docker containers. Historically, it has been vulnerable to multiple security issues including remote code execution, cross-site scripting, and privilege escalation vulnerabilities. The platform's CVE history reveals weaknesses in its web interface, container management, and access control mechanisms. While no major public security incidents have been widely reported, the presence of four CVEs indicates ongoing security challenges. Runtipi's architecture, which bridges complex container operations with user-friendly management, creates potential attack surfaces that require careful configuration and maintenance to mitigate risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-32729 | Runtipi has a TOTP two-factor authentication bypass via unrestricted brute-force on `/api/auth/verify-totp` — runtipiCWE-307 | 8.1 | High | 2026-03-13 |
| CVE-2026-31881 | Runtipi unauthenticated /api/auth/reset-password allows operator account takeover during active reset window — runtipiCWE-306 | 7.7 | High | 2026-03-11 |
| CVE-2026-25116 | Runtipi vulnerable to unauthenticated docker-compose.yml Overwrite via Path Traversal — runtipiCWE-22 | 7.6 | High | 2026-01-29 |
| CVE-2026-24129 | Runtipi is Vulnerable to Authenticated Arbitrary Remote Code Execution — runtipiCWE-78 | 8.1 | High | 2026-01-22 |
This page lists every published CVE security advisory associated with runtipi. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.