CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
The WHM Locale Upload feature in cPanel before 98.0.1 allows XXE attacks (SEC-585). | 7.2 |
High |
||
The WHM Locale Upload feature in cPanel before 98.0.1 allows unserialization attacks (SEC-585). | 7.2 |
High |
||
In cPanel before 96.0.13, scripts/fix-cpanel-perl mishandles the creation of temporary files (SEC-586). | 7.5 |
High |
||
In cPanel before 96.0.13, fix_cpanel_perl lacks verification of the integrity of downloads (SEC-587). | 8.1 |
High |
||
cPanel before 94.0.3 allows self-XSS via EasyApache 4 Save Profile (SEC-581). | 6.1 |
Medium |
||
cPanel before 92.0.9 allows a Reseller to bypass the suspension lock (SEC-578). | 7.5 |
High |
||
cPanel before 92.0.9 allows a MySQL user (who has an old-style password hash) to bypass suspension (SEC-579). | 7.5 |
High |
||
cPanel before 90.0.17 allows self-XSS via the WHM Transfer Tool interface (SEC-577). | 6.1 |
Medium |
||
cPanel before 90.0.17 has multiple instances of URL parameter injection (SEC-567). | 4.1 |
Medium |
||
cPanel before 88.0.3 mishandles the Exim filter path, leading to remote code execution (SEC-485). | 9.8 |
Critical |
||
cPanel before 88.0.3 allows attackers to bypass the SMTP greylisting protection mechanism (SEC-491). | 7.5 |
High |
||
chsh in cPanel before 88.0.3 allows a Jailshell escape (SEC-497). | 9.8 |
Critical |
||
In cPanel before 88.0.3, insecure RNDC credentials are used for BIND on a templated VM (SEC-549). | 9.8 |
Critical |
||
In cPanel before 88.0.3, an insecure auth policy API key is used by Dovecot on a templated VM (SEC-550). | 7.5 |
High |
||
In cPanel before 88.0.3, an insecure site password is used for Mailman on a templated VM (SEC-551). | 7.5 |
High |
||
In cPanel before 88.0.3, an insecure SRS secret is used on a templated VM (SEC-552). | 7.5 |
High |
||
In cPanel before 88.0.3, insecure chkservd test credentials are used on a templated VM (SEC-554). | 9.8 |
Critical |
||
cPanel before 88.0.3 has weak permissions (world readable) for the proxy subdomains log file (SEC-558). | 7.5 |
High |
||
cPanel before 88.0.3, upon an upgrade, establishes predictable PowerDNS API keys (SEC-561). | 7.5 |
High |
||
cPanel before 88.0.13 mishandles file-extension dispatching, leading to code execution (SEC-488). | 9.8 |
Critical |
||
cPanel before 88.0.13 allows bypass of a protection mechanism that attempted to restrict package modification (SEC-557). | 7.5 |
High |
||
cPanel before 88.0.13 allows self XSS via DNS Zone Manager DNSSEC interfaces (SEC-564). | 6.1 |
Medium |
||
cPanel before 90.0.10 allows self XSS via the WHM Edit DNS Zone interface (SEC-566). | 6.1 |
Medium |
||
The email quota cache in cPanel before 90.0.10 allows overwriting of files. | 7.5 |
High |
||
cPanel before 90.0.10 allows self XSS via WHM Manage API Tokens interfaces (SEC-569). | 6.1 |
Medium |
||
cPanel before 90.0.10 allows self XSS via the Cron Jobs interface (SEC-573). | 6.1 |
Medium |
||
cPanel before 90.0.10 allows self XSS via the Cron Editor interface (SEC-574). | 6.1 |
Medium |
||
cPanel before 84.0.20 allows resellers to achieve remote code execution as root via a cpsrvd rsync shell (SEC-545). | 7.2 |
High |
||
cPanel before 84.0.20 allows a demo account to achieve remote code execution via a cpsrvd rsync shell (SEC-544). | 9.8 |
Critical |
||
cPanel before 82.0.18 allows WebDAV authentication bypass because the connection-sharing logic is incorrect (SEC-534). | 9.8 |
Critical |
||
cPanel before 82.0.18 allows stored XSS via WHM Backup Restoration (SEC-533). | 5.4 |
Medium |
||
cPanel before 82.0.18 allows attackers to conduct arbitrary chown operations as root during log processing (SEC-532). | 5.5 |
Medium |
||
cPanel before 82.0.18 allows attackers to read an arbitrary database via MySQL dump streaming (SEC-531). | 6.5 |
Medium |
||
In cPanel before 82.0.18, Cpanel::Rand::Get can produce a predictable series of numbers (SEC-525). | 3.3 |
Low |
||
cPanel before 82.0.18 allows self-XSS because JSON string escaping is mishandled (SEC-520). | 6.1 |
Medium |
||
cPanel before 82.0.18 allows authentication bypass because of misparsing of the format of the password file (SEC-516). | 8.8 |
High |
||
cPanel before 82.0.18 allows authentication bypass because webmail usernames are processed inconsistently (SEC-499). | 8.8 |
High |
||
cPanel before 82.0.18 allows attackers to leverage virtual mail accounts in order to bypass account suspensions (SEC-508). | 5.4 |
Medium |
||
cPanel before 82.0.15 allows self XSS in the WHM Update Preferences interface (SEC-528). | 6.1 |
Medium |
||
cPanel before 82.0.15 allows self stored XSS in the WHM SSL Storage Manager interface (SEC-527). | 6.1 |
Medium |
||
cPanel before 82.0.15 allows self XSS in the SSL Key Delete interface (SEC-526). | 6.1 |
Medium |
||
cPanel before 82.0.15 allows self XSS in LiveAPI example scripts (SEC-524). | 6.1 |
Medium |
||
cPanel before 82.0.15 allows self XSS in the SSL Certificate Upload interface (SEC-521). | 6.1 |
Medium |
||
cPanel before 82.0.15 allows API token credentials to persist after an account has been renamed or terminated (SEC-517). | 8.8 |
High |
||
Directory traversal vulnerability in autoinstall4imagesgalleryupgrade.php in the Fantastico De Luxe Module for cPanel allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the scriptpath_show parameter in a GoAhead action. NOTE: this issue only crosses privilege boundaries when security settings such as disable_functions and safe_mode are active, since exploitation requires uploading of executable code to a home directory. | 6.8 |
|||
Multiple cross-site scripting (XSS) vulnerabilities in autoinstall4imagesgalleryupgrade.php in the Fantastico De Luxe Module for cPanel allow remote attackers to inject arbitrary web script or HTML via the (1) localapp, (2) updatedir, (3) scriptpath_show, (4) domain_show, (5) thispage, (6) thisapp, and (7) currentversion parameters in an Upgrade action. | 4.3 |
|||
Directory traversal vulnerability in frontend/x3/stats/lastvisit.html in cPanel allows remote attackers to read arbitrary files via a .. (dot dot) in the domain parameter. | 5 |
|||
cPanel does not automatically synchronize the PHP open_basedir configuration directive between the main server and virtual hosts that share physical directories, which might allow a local user to bypass open_basedir restrictions and access other virtual hosts via a PHP script that uses a main server URL (such as ~username) that is blocked by the user's own open_basedir directive, but not the main server's open_basedir directive. | 5.1 |
|||
fantastico in Cpanel does not properly handle when it has insufficient permissions to perform certain file operations, which allows remote authenticated users to obtain the full pathname, which is leaked in a PHP error message. | 4 |
|||
Cross-site scripting (XSS) vulnerability in dowebmailforward.cgi in cPanel allows remote attackers to inject arbitrary web script or HTML via a URL encoded value in the fwd parameter. | 4.3 |