{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-23846","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-16T15:46:40.843Z","datePublished":"2026-01-19T19:42:35.581Z","dateUpdated":"2026-01-20T14:40:03.105Z"},"containers":{"cna":{"title":"Tugtainer vulnerable to Password Exposure via URL Query Parameter","problemTypes":[{"descriptions":[{"cweId":"CWE-598","lang":"en","description":"CWE-598: Use of GET Request Method With Sensitive Query Strings","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/Quenary/tugtainer/security/advisories/GHSA-f2qf-f544-xm4p","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Quenary/tugtainer/security/advisories/GHSA-f2qf-f544-xm4p"},{"name":"https://github.com/Quenary/tugtainer/commit/9d23bf40ac1d39005582abfcf0a84753a4e29d52","tags":["x_refsource_MISC"],"url":"https://github.com/Quenary/tugtainer/commit/9d23bf40ac1d39005582abfcf0a84753a4e29d52"}],"affected":[{"vendor":"Quenary","product":"tugtainer","versions":[{"version":"< 1.16.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-19T19:42:35.581Z"},"descriptions":[{"lang":"en","value":"Tugtainer is a self-hosted app for automating updates of Docker containers. In versions prior to 1.16.1, the password authentication mechanism transmits passwords via URL query parameters instead of the HTTP request body. This causes passwords to be logged in server access logs and potentially exposed through browser history, Referer headers, and proxy logs. Version 1.16.1 patches the issue."}],"source":{"advisory":"GHSA-f2qf-f544-xm4p","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-20T14:39:41.231564Z","id":"CVE-2026-23846","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-20T14:40:03.105Z"}}]}}