No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ctrlpanel-gg
Ctrlpanel-gg panel |
|
| Vendors & Products |
Ctrlpanel-gg
Ctrlpanel-gg panel |
Tue, 19 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CtrlPanel is open-source billing software for hosting providers. Versions 1.1.1 and prior contain a Stored Cross-Site Scripting (XSS) vulnerability in the ticket reply notification system. Unsanitized reply content ($newmessage) is stored directly in database notification payloads and later rendered unescaped via Blade's {!! !!} syntax in the recipient's browser. The flaw exists in both App\Notifications\Ticket\Admin\AdminReplyNotification (triggered when a user replies, targeting admins) and App\Notifications\Ticket\User\ReplyNotification (triggered when an admin replies, targeting users), allowing arbitrary JavaScript execution in the victim's session context. A low-privileged attacker can exploit this to hijack admin sessions, harvest credentials via fake login prompts or keyloggers, and escalate privileges by performing administrative actions on the victim's behalf. The reverse path also enables a malicious or compromised admin to target regular users in the same manner. This issue has been fixed in version 1.2.0. | |
| Title | CtrlPanel: Stored XSS in Ticket Reply Notifications Allows Session Hijacking | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-20T14:08:56.728Z
Reserved: 2026-03-26T16:22:29.034Z
Link: CVE-2026-34241
Updated: 2026-05-20T14:08:47.529Z
Status : Deferred
Published: 2026-05-19T22:16:37.297
Modified: 2026-05-20T16:16:25.253
Link: CVE-2026-34241
No data.
OpenCVE Enrichment
Updated: 2026-05-20T10:38:57Z