Description
CyberPanel 2.1 contains a command execution vulnerability that allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through the filemanager controller endpoint. Attackers can manipulate the completeStartingPath parameter in POST requests to /filemanager/controller to create symbolic links, read sensitive files like database credentials, and execute arbitrary shell commands through the /websites/fetchFolderDetails endpoint.
Published: 2026-05-10
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

CyberPanel 2.1 contains an authenticated command execution flaw that allows attackers to read arbitrary files and run arbitrary shell commands by exploiting symlink attacks through the filemanager controller endpoint. Inadequate validation of the completeStartingPath parameter in POST requests to /filemanager/controller lets attackers create symbolic links that bypass normal path restrictions. By redirecting file operations, a malicious user can exfiltrate sensitive files such as database credentials and execute arbitrary commands via the /websites/fetchFolderDetails endpoint. This results in full compromise of the affected web server, giving the attacker read‑write access to all files and the ability to run code under the web server's user context.

Affected Systems

The flaw affects all installations of CyberPanel version 2.1, as identified by the Cyberpanel:CyberPanel CNA. The product is the CyberPanel control panel software for Linux web servers. No specific patch level is listed, so any 2.1 release remains vulnerable until a patch is applied. The impact applies to all servers running this panel regardless of the underlying web server or database stack.

Risk and Exploitability

The CVSS score of 8.7 indicates a high‑severity remote code execution risk. EPSS is not reported, but the absence of an EPSS value does not diminish the vulnerability's seriousness. CyberPanel is not listed in the CISA KEV catalog, suggesting no widespread exploitation has been observed publicly. Based on the description, the attack occurs remotely via the web interface and requires authenticated access to the panel, meaning an attacker must first obtain valid credentials or perform a credential‑guessing attack. Once authenticated, the attacker can submit crafted POST requests to /filemanager/controller to create arbitrary symbolic links and then trigger code execution via /websites/fetchFolderDetails. The exploit relies on the CVE's path‑traversal weakness (CWE‑59) and the ease of manipulating symbolic links, making the post‑authentication step a critical prerequisite.

Generated by OpenCVE AI on May 10, 2026 at 14:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the newest CyberPanel release that contains the command‑execution patch, or install the vendor’s security update for version 2.1.
  • Limit file manager access to privileged users only and disable or restrict the /filemanager/controller endpoint for all other accounts.
  • Configure the web server to block arbitrary shell command execution via the /websites/fetchFolderDetails endpoint, for example by disabling CGI, modifying the PHP configuration, or applying API rate limiting.

Generated by OpenCVE AI on May 10, 2026 at 14:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description CyberPanel 2.1 contains a command execution vulnerability that allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through the filemanager controller endpoint. Attackers can manipulate the completeStartingPath parameter in POST requests to /filemanager/controller to create symbolic links, read sensitive files like database credentials, and execute arbitrary shell commands through the /websites/fetchFolderDetails endpoint.
Title CyberPanel 2.1 Authenticated Remote Code Execution via Symlink Attack
First Time appeared Cyberpanel
Cyberpanel cyberpanel
Weaknesses CWE-59
CPEs cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:*
Vendors & Products Cyberpanel
Cyberpanel cyberpanel
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Cyberpanel Cyberpanel
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-10T12:52:10.631Z

Reserved: 2026-02-01T11:24:18.719Z

Link: CVE-2021-47949

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T13:16:31.453

Modified: 2026-05-10T13:16:31.453

Link: CVE-2021-47949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T15:00:11Z

Weaknesses