Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rpr2-4hqj-hc4q | 1Panel contains a cross-site request forgery (CSRF) vulnerability in the Change Username functionality |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
1panel
1panel 1panel |
|
| Vendors & Products |
1panel
1panel 1panel |
Wed, 10 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | 1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the Change Username functionality available from the settings panel (/settings/panel). The endpoint does not implement CSRF protections such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a username-change request; when a victim visits the page while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the victim’s 1Panel username without consent. After the change, the victim is logged out and unable to log in with the previous username, resulting in account lockout and denial of service. | |
| Title | 1Panel CSRF in Change Username Functionality Allows Account Lockout | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-10T16:58:19.168Z
Reserved: 2025-04-15T19:15:22.599Z
Link: CVE-2025-34410
Updated: 2025-12-10T16:58:03.289Z
Status : Received
Published: 2025-12-10T16:16:24.793
Modified: 2025-12-10T16:16:24.793
Link: CVE-2025-34410
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:01Z
Github GHSA