Impact
This vulnerability allows an unauthenticated attacker to execute arbitrary shell commands via the web‑based installer. The flaw arises because the installer checks for an install lock only after including form handlers, and unsanitized user input is directly inserted into shell commands. As a result, an attacker can run any command on the host, compromising confidentiality, integrity, and availability of the server. The weakness corresponds to improper authorization and unsafe command execution (CWE-284 and CWE-78).
Affected Systems
Ctrlpanel‑gg panel versions 1.1.1 and earlier are affected. The issue is resolved in v1.2.0. The software is an open‑source billing solution for hosting providers.
Risk and Exploitability
The vulnerability has a CVSS score of 10, indicating critical severity. No EPSS data is available, but the advisory states that it is actively exploited in the wild. The attacker does not need authentication and can reach the vulnerable endpoint through normal web requests. Since the vulnerability is excluded from CISA KEV, it has not yet been catalogued there, but its high impact and active exploitation warrant immediate attention.
OpenCVE Enrichment