Description
A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges.
Published: 2025-08-01
Score: 8.7 High
EPSS: 59.6% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2013-7260 A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges.
History

Thu, 20 Nov 2025 23:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:zpanel_project:zpanel:*:*:*:*:*:*:*:*

Mon, 04 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 Aug 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Zpanel Project
Zpanel Project zpanel
Vendors & Products Zpanel Project
Zpanel Project zpanel

Fri, 01 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges.
Title ZPanel <= 10.0.0.2 htpasswd Module Username Command Execution
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Zpanel Project Zpanel
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T15:43:18.117Z

Reserved: 2025-08-01T15:30:06.448Z

Link: CVE-2013-10053

cve-icon Vulnrichment

Updated: 2025-08-04T16:04:40.759Z

cve-icon NVD

Status : Deferred

Published: 2025-08-01T21:15:27.290

Modified: 2026-04-15T00:35:42.020

Link: CVE-2013-10053

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-04T08:49:33Z

Weaknesses