Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. The official Docker image for Termix versions 1.5.0 and below, due to being configured with an Nginx reverse proxy, causes the backend to retrieve the proxy's IP instead of the client's IP when using the req.ip method. This results in isLocalhost always returning True. Consequently, the /ssh/db/host/internal endpoint can be accessed directly without login or authentication. This endpoint records the system's stored SSH host information, including addresses, usernames, and passwords, posing an extremely high security risk. Users who use the official Termix docker image, build their own image using the official dockerfile, or utilize reverse proxy functionality will be affected by this vulnerability. This issue is fixed in version 1.6.0.
History

Mon, 20 Oct 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Termix
Termix termix
Weaknesses CWE-345
CPEs cpe:2.3:a:termix:termix:*:*:*:*:*:*:*:*
Vendors & Products Termix
Termix termix
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Mon, 06 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Oct 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Termix Project
Termix Project termix
Vendors & Products Termix Project
Termix Project termix

Wed, 01 Oct 2025 22:00:00 +0000

Type Values Removed Values Added
Description Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. The official Docker image for Termix versions 1.5.0 and below, due to being configured with an Nginx reverse proxy, causes the backend to retrieve the proxy's IP instead of the client's IP when using the req.ip method. This results in isLocalhost always returning True. Consequently, the /ssh/db/host/internal endpoint can be accessed directly without login or authentication. This endpoint records the system's stored SSH host information, including addresses, usernames, and passwords, posing an extremely high security risk. Users who use the official Termix docker image, build their own image using the official dockerfile, or utilize reverse proxy functionality will be affected by this vulnerability. This issue is fixed in version 1.6.0.
Title Termix' official Docker image contains an authentication bypass vulnerability
Weaknesses CWE-284
CWE-348
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-10-01T21:52:01.232Z

Updated: 2025-10-06T18:33:37.335Z

Reserved: 2025-09-23T14:33:49.506Z

Link: CVE-2025-59951

cve-icon Vulnrichment

Updated: 2025-10-06T18:33:26.242Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-01T22:15:31.683

Modified: 2025-10-20T18:37:31.173

Link: CVE-2025-59951

cve-icon Redhat

No data.