PT-2025-26757 · Unknown · Centos Web Panel
Maxime Rinaudo
·
Published
2025-06-24
·
Updated
2025-12-04
·
CVE-2025-48703
CVSS v3.1
9.0
9.0
Critical
| Base vector | Vector | AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Control Web Panel (CWP) versions prior to 0.9.8.1205
Description
CWP (also known as CentOS Web Panel) is affected by a critical remote code execution (RCE) issue. An unauthenticated attacker, possessing a valid (non-root) username, can execute arbitrary commands on a vulnerable system. The vulnerability stems from insufficient input validation of the
t total parameter within a request to /admin/loader ajax.php?ajax=filemanager&acc=changePerm. Specifically, the application directly incorporates user-supplied input into shell commands without proper sanitization, allowing for command injection. Exploitation involves crafting a malicious POST request to this endpoint, enabling the attacker to execute commands in the context of the CWP process. Reports indicate active exploitation of this vulnerability in the wild, with over 1.8 million potentially vulnerable instances identified. The vulnerability allows attackers to gain full control of the server, potentially leading to data compromise, backdoors, and further network intrusion. The vulnerable endpoint is /admin/loader ajax.php?ajax=filemanager&acc=changePerm and the vulnerable parameter is t total.Recommendations
Control Web Panel versions prior to 0.9.8.1205 should be updated to version 0.9.8.1205 or later.
Exploit
Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-07803
CVE-2025-48703
Affected Products
Centos Web Panel
References · 53
- 🔥 https://github.com/Skynoxk/CVE-2025-48703⭐ 2 🔗 1 · Exploit
- 🔥 https://fenrisk.com/rce-centos-webpanel · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-48703 · Security Note
- https://bdu.fstec.ru/vul/2025-07803 · Security Note
- https://control-webpanel.com/changelog · Security Note
- https://t.me/CSIRT_italia/2837 · Telegram Post
- https://twitter.com/transilienceai/status/1986675198599578092 · Twitter Post
- https://twitter.com/transilienceai/status/1987037520748511429 · Twitter Post
- https://t.me/defcon_news/130701 · Telegram Post
- https://twitter.com/zoomeye_team/status/1942104660250435827 · Twitter Post
- https://twitter.com/zerotalktoai/status/1991295178435621350 · Twitter Post
- https://securityweek.com/cisa-warns-of-cwp-vulnerability-exploited-in-the-wild · Reddit Post
- https://twitter.com/CveFindCom/status/1969101632383172903 · Twitter Post
- https://t.me/cveNotify/141756 · Telegram Post
- https://twitter.com/CentlogixAgency/status/1987010467869458536 · Twitter Post