No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23654 | RatPanel can perform remote command execution without authorization |
Github GHSA |
GHSA-fm3m-jrgm-5ppg | RatPanel can perform remote command execution without authorization |
Thu, 07 Aug 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ratpanel Project
Ratpanel Project ratpanel |
|
| Vendors & Products |
Ratpanel Project
Ratpanel Project ratpanel |
Wed, 06 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RatPanel is a server operation and maintenance management panel. In versions 2.3.19 through 2.5.5, when an attacker obtains the backend login path of RatPanel (including but not limited to weak default paths, brute-force cracking, etc.), they can execute system commands or take over hosts managed by the panel without logging in. In addition to this remote code execution (RCE) vulnerability, the flawed code also leads to unauthorized access. RatPanel uses the CleanPath middleware provided by github.com/go-chi/chi package to clean URLs, but but the middleware does not process r.URL.Path, which can cause the paths to be misinterpreted. This is fixed in version 2.5.6. | |
| Title | RatPanel can perform remote command execution without authorization | |
| Weaknesses | CWE-305 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-06T19:21:42.760Z
Reserved: 2025-07-02T15:15:11.515Z
Link: CVE-2025-53534
Updated: 2025-08-06T16:14:53.446Z
Status : Deferred
Published: 2025-08-05T21:15:38.897
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-53534
No data.
OpenCVE Enrichment
Updated: 2025-08-06T15:12:49Z
EUVD
Github GHSA