The vulnerability is a path traversal weakness in Beszel's authenticated API endpoints /api/beszel/containers/logs and /api/beszel/containers/info. The root cause is the lack of input validation and sanitization of the container query parameter. This user-supplied parameter, representing a Docker container ID, was passed directly from the hub to the agent. The agent, in turn, used this raw value to construct a URL path to communicate with the Docker Engine API via a Unix socket. Since Go's HTTP client does not sanitize ../ sequences in URL paths over Unix sockets, an authenticated attacker could craft a malicious container parameter (e.g., ../../version) to traverse the directory structure and access arbitrary Docker API endpoints on the agent host. This escalates privileges, as even a read-only user could exfiltrate sensitive infrastructure details. The patch addresses this by introducing strict validation of the container ID format on both the hub and agent sides, ensuring it's a valid hexadecimal string, and by using url.PathEscape to properly encode the container ID when constructing the Docker API URL, preventing path traversal.