Termix Docker Image Leaking SSH Credentials (CVE-2025-59951)


A critical vulnerability in the official Termix Docker image puts users at risk of exposing sensitive SSH credentials.

The flaw allows anyone with network access to retrieve stored host addresses, usernames, and passwords without logging in.

How the Vulnerability Works

Termix provides a Docker image that runs a Node.js backend behind an Nginx reverse proxy.

The backend code uses the req.ip method to determine if a request came from the local machine, as reported by Security Researchers.

Because Nginx and Termix run in the same environment, req.ip always returns the proxy’s IP address (127.0.0.1). This makes the application believe every request is from localhost.

CVE ID CVE-2025-59951
Package Termix (Node.js)
Affected Versions release-0.1.1-tag – release-1.6.0-tag
Patched Versions None
Severity Critical

As a result, anyone can call the /ssh/db/host/internal endpoint and retrieve SSH host details without any authentication.

Endpoint can be accessed directly without login or authentication

In a typical deployment, the Termix service resides inside a virtual machine. Attackers can scan network assets to find exposed instances.

By sending a simple GET request to the vulnerable endpoint, they receive a list of SSH hosts saved by the service, including credentials needed to connect to upstream servers.

This vulnerability affects all Termix Docker releases from release-0.1.1-tag through release-1.6.0-tag. No patched version exists at the time of writing.

host machine can directly access this interface without logging in
host machine can directly access this interface without logging in

Systems using the official image or custom images built from the official Dockerfile are vulnerable if they use an Nginx reverse proxy with default settings. Security teams can reproduce the flaw by accessing:

http://:/ssh/db/host/internal

With a standard HTTP request, the backend returns complete SSH configuration data. Network scanners and asset mapping platforms make it easy for attackers to locate vulnerable hosts.

Once access is gained, an adversary can move laterally across the network or harvest credentials for further attacks.

Mitigation and Recommendations

To protect against this issue, modify the backend validation logic to use the X-Real-IP header instead of req.ip or the default proxy-forwarded IP.

This change ensures the application accurately identifies the client’s IP address. Administrators should also:

  • Restrict access to management endpoints using firewall rules.
  • Place Termix behind an authenticated gateway or VPN.
  • Monitor logs for unexpected requests to the /ssh/db/host/internal endpoint.
  • Rotate any SSH credentials that may have been exposed.

Until a patched Termix Docker image is released, these measures can reduce exposure and limit potential damage.

Users of the Termix Docker image should apply recommended mitigations immediately and await an official patch to ensure SSH credentials remain secure.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.