Impact
In MaxKB versions 2.7.1 and earlier, an authenticated user with tool‑editing permissions can use the socket.sendto() function with the MSG_FASTOPEN flag to establish TCP connections directly through the kernel, thereby bypassing the sandbox's IP validation hooks. This flaw turns the sandbox protection from a containment mechanism into a bypass path, enabling the user to reach internal services that are otherwise blocked by the banned hosts configuration. The vulnerability is categorized as a Server‑Side Request Forgery type exploit and can compromise confidentiality of internal resources.
Affected Systems
The affected product is MaxKB developed by 1Panel‑dev. Any installations of version 2.7.1 or earlier are susceptible. The fix is available in version 2.8.0 and later.
Risk and Exploitability
The CVSS v3.1 base score for this issue is 5.0, indicating a medium severity. No EPSS data is available, and the vulnerability is not listed in CISA's KEV catalog. Attack requires valid credentials with tool‑editing privileges; a legitimate user can invoke the bypass by executing a crafted sendto() request. Once exploited, the attacker can reach services hidden behind the sandbox, potentially exposing internal data or enabling further lateral movement.
OpenCVE Enrichment