Impact
The vulnerability exists in MaxKB’s ToolExecutor component, where an authenticated user with workspace privileges can exploit Python’s ctypes library to invoke raw system calls. Because the LD_PRELOAD-based sandbox.so module, which intercepts critical functions such as execve, system, connect, and open, does not block the pkey_mprotect system call, an attacker can bypass the sandbox’s protection to allocate executable memory and execute malicious code. This flaw, classified under CWE‑693 and CWE‑94, enables arbitrary code execution, potentially allowing full network exfiltration and container compromise.
Affected Systems
Affected products are 1Panel‑dev’s MaxKB versions 2.7.1 and earlier. The issue has been resolved in version 2.8.0 and later deployments.
Risk and Exploitability
The CVSS score of 6.3 indicates a medium severity vulnerability. EPSS data is unavailable, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires authentication with workspace privileges, which limits the attacker pool to trusted users, but once compromised the attacker can achieve complete system takeover, making it a high‑priority risk for environments exposing MaxKB to external or internal collaborators.
OpenCVE Enrichment