CyberPanel before 2.3.8 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the phpSelection field to the websites/submitWebsiteCreation URI.
References
| Link | Resource |
|---|---|
| https://github.com/ThottySploity/CVE-2024-53376 | Exploit Third Party Advisory |
| https://github.com/ThottySploity/CVE-2024-53376/blob/aa306187323bd1127d56803cb34cac8820b61484/cyberpanel.py#L70 | Product |
| https://thottysploity.github.io/posts/cve-2024-53376 | Exploit Third Party Advisory |
| https://github.com/ThottySploity/CVE-2024-53376 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-12-16 04:15
Updated : 2025-09-05 00:33
NVD link : CVE-2024-53376
Mitre link : CVE-2024-53376
CVE.ORG link : CVE-2024-53376
JSON object : View
Products Affected
cyberpanel
- cyberpanel
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
