Impact
The vulnerability is a failure in deserialization of session data in the web terminal component of HestiaCP 1.9.0–1.9.4, where HTTP headers crafted by an unauthenticated attacker are interpreted by the Node.js process as trusted session values. This mismatch between PHP and Node.js session handling allows the execution of arbitrary commands with root privileges on the host system.
Affected Systems
This flaw impacts clients running HestiaCP web control panels between version 1.9.0 and 1.9.4 that have the web terminal feature enabled. Systems without the web terminal or running later versions are not affected.
Risk and Exploitability
With a CVSS score of 9.5 the vulnerability is categorized as critical, and while no EPSS value is published, the absence of a KEV listing indicates no confirmed widespread exploitation as of now but the potential for unauthenticated remote code execution makes it a high‑risk issue. Attackers can achieve compromised hosts by submitting specially crafted HTTP headers without needing credentials.
OpenCVE Enrichment