Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 30 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Dec 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in CloudPanel Community Edition up to 2.5.1. The affected element is an unknown function of the file /admin/users of the component HTTP Header Handler. Such manipulation of the argument Referer leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.5.2 is sufficient to fix this issue. Upgrading the affected component is recommended. | |
| Title | CloudPanel Community Edition HTTP Header users redirect | |
| Weaknesses | CWE-601 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-30T14:41:02.720Z
Reserved: 2025-12-29T08:09:43.281Z
Link: CVE-2025-15241
Updated: 2025-12-30T14:40:57.781Z
Status : Received
Published: 2025-12-30T09:15:52.787
Modified: 2025-12-30T09:15:52.787
Link: CVE-2025-15241
No data.
OpenCVE Enrichment
No data.