Impact
Admin controller endpoints in CtrlPanel allow any authenticated user to query DataTable routes, returning sensitive information such as user personal data, payment records, voucher codes and support tickets. The missing authentication checks mean that users who are not administrators can retrieve full database records through simple GET requests. This leads to unauthorized disclosure of confidential data and could be used to map the system’s role structure or locate privileged content.
Affected Systems
CtrlPanel released by Ctrlpanel‑gg, version 1.1.1 and earlier are affected. The issue is addressed in release 1.2.0, which adds proper admin‑level authorization to the vulnerable routes.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, and the EPSS score is currently unavailable. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only an authenticated session and can be performed by normal web interactions with the /admin/* endpoints, with no additional privileges or complex conditions.
OpenCVE Enrichment