CVE-2025-48703

CRITICAL
2025-09-19 [email protected]
9.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 28, 2026 - 19:13 vuln.today
Added to CISA KEV
Nov 05, 2025 - 14:07 cisa
CISA KEV
PoC Detected
Nov 05, 2025 - 14:07 vuln.today
Public exploit code
CVE Published
Sep 19, 2025 - 18:15 nvd
CRITICAL 9.0

Description

CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1205 allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.

Analysis

CentOS Web Panel (CWP) allows unauthenticated remote code execution through OS command injection in the filemanager changePerm request's t_total parameter.

Technical Context

The CWE-78 command injection in the filemanager's changePerm CGI passes the t_total parameter to a shell command without sanitization, enabling arbitrary command execution.

Affected Products

['CWP (Control Web Panel) before 0.9.8.1205']

Remediation

Update CWP. Restrict panel access. Audit hosted sites for compromise.

Priority Score

174
Low Medium High Critical
KEV: +50
EPSS: +59.1
CVSS: +45
POC: +20

Share

CVE-2025-48703 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy