PT-2025-31881 · Ratpanel · Ratpanel

Ltltlxey

·

Published

2025-08-04

·

Updated

2025-08-05

·

CVE-2025-53534

CVSS v4.0
7.7
VectorAV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

**Name of the Vulnerable Software and Affected Versions:**

RatPanel versions 2.3.19 through 2.5.5

**Description:**

RatPanel is susceptible to remote code execution (RCE) and unauthorized access. An attacker who obtains the backend login path of RatPanel can execute system commands or take over hosts managed by the panel without logging in. This is due to the `CleanPath` middleware not processing `r.URL.Path`, leading to path misinterpretation and authentication bypass. Specifically, the vulnerability affects the `must login` middleware, allowing access to dangerous interfaces such as `/api/ws/exec` and `/api/ws/ssh`. Exploitation requires activating a session, but does not require completing the full authentication process.

**Recommendations:**

RatPanel versions 2.3.19 through 2.5.5 are affected and should be updated to version 2.5.6 or later.

Fix

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2025-53534
GHSA-FM3M-JRGM-5PPG

Affected Products

Ratpanel