TROYANOSYVIRUS
Back to CVEs

CVE-2024-51567

CRITICALCISA KEV
10.0

Description

upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.

CVE Details

CVSS v3.1 Score10.0
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/29/2024
Last Modified11/7/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorCyberPersons
ProductCyberPanel
Vulnerability NameCyberPanel Incorrect Default Permissions Vulnerability
KEV Date Added2024-11-07
Remediation Due Date2024-11-28
Ransomware UseKnown

Affected Products

cyberpanel:cyberpanel

Weaknesses (CWE)

CWE-306CWE-306

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.