Original Article Text

Click to Toggle View

CISA warns of critical CentOS Web Panel bug exploited in attacks. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning that threat actors are exploiting a critical remote command execution flaw in CentOS Web Panel (CWP). The agency has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and is giving federal entities subject to the BOD 22-01 guidance until November 25 to apply available security updates and vendor-provided mitigations, or stop using the product. Tracked as CVE-2025-48703, the security issue allows remote, unauthenticated attackers with knowledge of a valid username on a CWP instance to execute arbitrary shell commands as that user. CWP is a free web hosting control panel used for Linux server management, marketed as an open-source alternative to commercial panels like cPanel and Plesk. It is widely used by web hosting providers, system administrators, and VPS or dedicated server operators. The issue impacts all CWP versions before 0.9.8.1204 and was demonstrated on CentOS 7 in late June by Fenrisk security researcher Maxime Rinaudo. In a detailed technical write-up, the researcher explains that the root cause of the flaw is the file-manager ‘changePerm’ endpoint processing requests even when the per-user identifier is omitted, allowing unauthenticated requests to reach code that expects a logged-in user. Furthermore, the ‘t_total’ parameter, which works as a file permission mode in the chmod system command, is passed unsanitized into a shell command, allowing shell injection and arbitrary command execution. In Rinaudo's exploit, a POST request to the file-manager changePerm endpoint with a crafted t_total injects a shell command and spawns a reverse shell as the target user. The researcher reported the flaw to CWP on May 13, and a fix was released on June 18, in version 0.9.8.1205 of the product. Yesterday, CISA added the flaw to the KEV catalog without sharing any details about how it is being exploited, the targets, or the origin of the malicious activity. The agency also added to the catalog CVE-2025-11371, a local file inclusion flaw in Gladinet CentreStack and Triofox products, and gave the same November 25 deadline to federal agencies to patch or stop using the product. That flaw was marked as an actively exploited zero-day by Huntress on October 10, and the vendor patched it four days later, in version 16.10.10408.56683. Even if CISA's KEV is aimed at federal agencies in the U.S., any organization should monitor it and prioritize dealing with the vulnerabilities it includes. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.

Daily Brief Summary

VULNERABILITIES // CISA Alerts on Critical CentOS Web Panel Exploitation Risk

CISA has issued a warning about a critical remote command execution vulnerability in CentOS Web Panel, now added to the Known Exploited Vulnerabilities catalog.

The flaw, identified as CVE-2025-48703, allows remote attackers to execute arbitrary commands if they know a valid username on a CWP instance.

This vulnerability affects all versions of CWP prior to 0.9.8.1204, impacting web hosting providers and system administrators using the panel.

A detailed analysis by security researcher Maxime Rinaudo revealed the flaw stems from improper input handling in the file-manager ‘changePerm’ endpoint.

Federal entities are required to apply security updates or cease using the product by November 25, in accordance with CISA's BOD 22-01 guidance.

CISA's advisory serves as a reminder for organizations to monitor and prioritize addressing vulnerabilities listed in the KEV catalog.

The vulnerability was patched in CWP version 0.9.8.1205, released on June 18, following the researcher's report in May.