OS Command injection vulnerability in function OperateSSH in 1panel 2.0.8 allowing attackers to execute arbitrary commands via the operation parameter to the /api/v2/hosts/ssh/operate endpoint.
References
Link | Resource |
---|---|
https://github.com/August829/CVEP/issues/5 | Issue Tracking |
https://github.com/August829/Yu/blob/main/20250812_1.md | Broken Link |
Configurations
History
17 Sep 2025, 20:28
Type | Values Removed | Values Added |
---|---|---|
First Time |
1panel 1panel
1panel |
|
References | () https://github.com/August829/CVEP/issues/5 - Issue Tracking | |
References | () https://github.com/August829/Yu/blob/main/20250812_1.md - Broken Link | |
CPE | cpe:2.3:a:1panel:1panel:2.0.8:*:*:*:*:*:*:* |
10 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-78 |
10 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-10 14:15
Updated : 2025-09-17 20:28
NVD link : CVE-2025-56413
Mitre link : CVE-2025-56413
CVE.ORG link : CVE-2025-56413
JSON object : View
Products Affected
1panel
- 1panel
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')