Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CISA Warns Of CentOS Panel Exploit

November 7, 2025
Reading Time: 3 mins read
in Alerts
Gootloader Returns With New Tricks

The U.S. Cybersecurity & Infrastructure Security Agency, widely known as CISA, has sounded the alarm over an actively exploited, critical remote command execution flaw discovered in the CentOS Web Panel (CWP). The agency’s alert stems from observations that threat actors are successfully exploiting this vulnerability, putting numerous Linux servers at risk.

CWP is a popular, free web hosting control panel frequently used by system administrators, web hosting providers, and operators of VPS or dedicated servers as an open-source alternative to commercial solutions like cPanel and Plesk. The widespread use of the panel means this flaw presents a significant and immediate risk across a large segment of the hosting infrastructure landscape. The vulnerability, officially tracked as CVE-2025-48703, is particularly dangerous because it grants a high level of unauthorized access. It allows a remote attacker to execute arbitrary shell commands on the CWP instance as the targeted user.

Crucially, the exploit is unauthenticated, meaning the attacker doesn’t need to log in, and only requires knowledge of a valid username on the affected system to successfully compromise it. This low barrier to exploitation is a primary factor contributing to the urgency of CISA’s warning. The issue affects all versions of CWP preceding 0.9.8.1204 and was publicly demonstrated on CentOS 7 systems by security researcher Maxime Rinaudo in late June.In response to the confirmed active exploitation, CISA has taken the necessary step of incorporating the vulnerability into its Known Exploited Vulnerabilities (KEV) catalog.

This action elevates the risk level associated with CVE-2025-48703 and triggers mandatory compliance for federal civilian executive branch agencies under the BOD 22-01 guidance. These federal entities are now under a strict deadline of November 25 to either apply the available security updates and vendor-provided mitigations or immediately discontinue the use of the vulnerable CWP product entirely to eliminate the security gap.A detailed technical write-up provided by the discovering security researcher, Maxime Rinaudo, shed light on the flaw’s core mechanism. The root cause lies within the file-manager ‘changePerm’ endpoint. This endpoint was found to improperly process incoming requests even when the expected per-user identifier was omitted.

This oversight allowed unauthenticated requests to bypass initial security checks and reach internal code that was intended only for a logged-in user. The failure to validate the user’s login state was the essential first step in the exploit chain.The second, equally critical factor was how the system handled a specific input parameter. The technical write-up highlighted that the ‘t_total’ parameter, which is intended to function as the file permission mode for the system’s $\text{chmod}$ command, was being passed into a shell command unsanitized. This oversight created a classic shell injection vulnerability, enabling the execution of arbitrary commands.

Rinaudo’s demonstration exploit utilized a specially crafted POST request to the vulnerable $\text{changePerm}$ endpoint, inserting a shell command into the $\text{t\_total}$ field to successfully spawn a reverse shell connection as the target user.

Reference:

  • CISA Warns Of Critical CentOS Web Panel Vulnerability Exploited In Active Attacks
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Albiriox Malware Hits Hundreds Of Apps

Google Meet Page Used To Deliver Malware

December 1, 2025
Tomiris Shifts To Public Service C2

Tomiris Shifts To Public Service C2

December 1, 2025
Albiriox Malware Hits Hundreds Of Apps

Albiriox Malware Hits Hundreds Of Apps

December 1, 2025
ShadowV2 Botnet Tests During AWS Outage

Bloody Wolf Widens Java RAT Campaign

November 28, 2025
ShadowV2 Botnet Tests During AWS Outage

Forge Library Patch Stops Signature Bypass

November 28, 2025
ShadowV2 Botnet Tests During AWS Outage

ShadowV2 Botnet Tests During AWS Outage

November 28, 2025

Latest Alerts

Google Meet Page Used To Deliver Malware

Tomiris Shifts To Public Service C2

Albiriox Malware Hits Hundreds Of Apps

Bloody Wolf Widens Java RAT Campaign

Forge Library Patch Stops Signature Bypass

ShadowV2 Botnet Tests During AWS Outage

Subscribe to our newsletter

    Latest Incidents

    Ecommerce Breach Exposes 34 Million

    Ransomware Hits Golf Manor Network

    Yearn Finance Hit By 9M Token Exploit

    Mazda Reports No Impact From Oracle Hack

    Asahi Breach Hits Two Million Users

    Qilin Ransomware Hits Korean MSP

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial