Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Root-Privileged Command Injection in Control Web Panel via Unsanitized API Parameter |
Fri, 08 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated OS Command Injection via 'key' API Parameter in Control Web Panel before v0.9.8.1209 |
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated OS Command Injection via 'key' API Parameter in Control Web Panel before v0.9.8.1209 | |
| Weaknesses | CWE-78 |
Fri, 08 May 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 08 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "key" GET parameter to /admin/index.php (when the "api" parameter is set) is not properly sanitized before being used to execute OS commands. This can be exploited by unauthenticated attackers to inject and execute arbitrary OS commands with the privileges of root on the web server. Softaculous or SitePad must be present. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T14:13:43.786Z
Reserved: 2025-12-12T00:00:00.000Z
Link: CVE-2025-67888
Updated: 2026-05-08T05:52:30.620Z
Status : Awaiting Analysis
Published: 2026-05-08T07:16:28.487
Modified: 2026-05-08T16:02:14.343
Link: CVE-2025-67888
No data.
OpenCVE Enrichment
Updated: 2026-05-08T19:00:12Z