An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "key" GET parameter to /admin/index.php (when the "api" parameter is set) is not properly sanitized before being used to execute OS commands. This can be exploited by unauthenticated attackers to inject and execute arbitrary OS commands with the privileges of root on the web server. Softaculous or SitePad must be present.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 09 May 2026 15:00:00 +0000

Type Values Removed Values Added
Title Root-Privileged Command Injection in Control Web Panel via Unsanitized API Parameter

Fri, 08 May 2026 19:15:00 +0000

Type Values Removed Values Added
Title Root-Privileged Command Injection in Control Web Panel via Unsanitized API Parameter

Fri, 08 May 2026 15:30:00 +0000

Type Values Removed Values Added
Title Unauthenticated OS Command Injection via 'key' API Parameter in Control Web Panel before v0.9.8.1209

Fri, 08 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 08:00:00 +0000

Type Values Removed Values Added
Title Unauthenticated OS Command Injection via 'key' API Parameter in Control Web Panel before v0.9.8.1209
Weaknesses CWE-78

Fri, 08 May 2026 07:30:00 +0000

Type Values Removed Values Added
References

Fri, 08 May 2026 06:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "key" GET parameter to /admin/index.php (when the "api" parameter is set) is not properly sanitized before being used to execute OS commands. This can be exploited by unauthenticated attackers to inject and execute arbitrary OS commands with the privileges of root on the web server. Softaculous or SitePad must be present.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-08T14:13:43.786Z

Reserved: 2025-12-12T00:00:00.000Z

Link: CVE-2025-67888

cve-icon Vulnrichment

Updated: 2026-05-08T05:52:30.620Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-08T07:16:28.487

Modified: 2026-05-08T16:02:14.343

Link: CVE-2025-67888

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T14:45:06Z

Weaknesses