CVE-2024-51378: n/a
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
AI Analysis
Technical Summary
CVE-2024-51378 is a critical command injection vulnerability affecting CyberPanel, an open-source web hosting control panel widely used for managing DNS and FTP services. The vulnerability exists in the getresetstatus function within dns/views.py and ftp/views.py. The root cause is that the secMiddleware, which is intended to protect these endpoints, only enforces authentication for POST requests. However, the vulnerable endpoints accept GET requests, allowing attackers to bypass authentication by sending crafted GET requests to /dns/getresetstatus or /ftp/getresetstatus. Furthermore, the statusfile parameter is vulnerable to shell metacharacter injection, enabling attackers to execute arbitrary shell commands on the underlying system. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Exploitation requires no authentication or user interaction and can be performed remotely over the network. The vulnerability affects CyberPanel versions through 2.3.6 and the unpatched 2.3.7 release. Although no official patches are linked yet, the vulnerability was publicly disclosed on October 29, 2024, with confirmed exploitation in the wild by the PSAUX threat actor. The vulnerability’s CVSS v3.1 score is 10.0 (critical), reflecting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation and no required privileges.
Potential Impact
For European organizations, the impact of CVE-2024-51378 is severe. CyberPanel is commonly used by hosting providers, web administrators, and enterprises to manage DNS and FTP services. Successful exploitation allows attackers to execute arbitrary commands remotely without authentication, potentially leading to full system compromise. This can result in data theft, service disruption, defacement, ransomware deployment, or use of compromised servers as pivot points for further attacks. Organizations with public-facing CyberPanel installations are especially vulnerable. The breach of DNS management could allow attackers to manipulate domain records, redirect traffic, or intercept sensitive communications. FTP service compromise could expose sensitive files or credentials. Given the critical nature of the vulnerability and active exploitation, European entities relying on CyberPanel for critical infrastructure or customer-facing services face significant operational, reputational, and regulatory risks, including GDPR compliance issues if personal data is exposed.
Mitigation Recommendations
1. Immediate action should be to upgrade CyberPanel to a patched version once available. Monitor official CyberPanel channels for security updates addressing CVE-2024-51378. 2. Until patches are released, restrict access to the /dns/getresetstatus and /ftp/getresetstatus endpoints using network-level controls such as firewall rules or IP whitelisting to trusted administrators only. 3. Implement web application firewall (WAF) rules to detect and block requests containing suspicious shell metacharacters or unusual query parameters targeting these endpoints. 4. Disable or limit the use of the affected endpoints if possible, or configure CyberPanel to reject GET requests on these paths, enforcing POST-only access as intended. 5. Conduct thorough audits of CyberPanel logs for indicators of compromise or exploitation attempts, focusing on unusual GET requests to the vulnerable endpoints. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns. 7. Educate system administrators about the risk and ensure strong operational security practices, including regular backups and incident response readiness. 8. Consider isolating CyberPanel management interfaces from the public internet by placing them behind VPNs or jump hosts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-51378: n/a
Description
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
AI-Powered Analysis
Technical Analysis
CVE-2024-51378 is a critical command injection vulnerability affecting CyberPanel, an open-source web hosting control panel widely used for managing DNS and FTP services. The vulnerability exists in the getresetstatus function within dns/views.py and ftp/views.py. The root cause is that the secMiddleware, which is intended to protect these endpoints, only enforces authentication for POST requests. However, the vulnerable endpoints accept GET requests, allowing attackers to bypass authentication by sending crafted GET requests to /dns/getresetstatus or /ftp/getresetstatus. Furthermore, the statusfile parameter is vulnerable to shell metacharacter injection, enabling attackers to execute arbitrary shell commands on the underlying system. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Exploitation requires no authentication or user interaction and can be performed remotely over the network. The vulnerability affects CyberPanel versions through 2.3.6 and the unpatched 2.3.7 release. Although no official patches are linked yet, the vulnerability was publicly disclosed on October 29, 2024, with confirmed exploitation in the wild by the PSAUX threat actor. The vulnerability’s CVSS v3.1 score is 10.0 (critical), reflecting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation and no required privileges.
Potential Impact
For European organizations, the impact of CVE-2024-51378 is severe. CyberPanel is commonly used by hosting providers, web administrators, and enterprises to manage DNS and FTP services. Successful exploitation allows attackers to execute arbitrary commands remotely without authentication, potentially leading to full system compromise. This can result in data theft, service disruption, defacement, ransomware deployment, or use of compromised servers as pivot points for further attacks. Organizations with public-facing CyberPanel installations are especially vulnerable. The breach of DNS management could allow attackers to manipulate domain records, redirect traffic, or intercept sensitive communications. FTP service compromise could expose sensitive files or credentials. Given the critical nature of the vulnerability and active exploitation, European entities relying on CyberPanel for critical infrastructure or customer-facing services face significant operational, reputational, and regulatory risks, including GDPR compliance issues if personal data is exposed.
Mitigation Recommendations
1. Immediate action should be to upgrade CyberPanel to a patched version once available. Monitor official CyberPanel channels for security updates addressing CVE-2024-51378. 2. Until patches are released, restrict access to the /dns/getresetstatus and /ftp/getresetstatus endpoints using network-level controls such as firewall rules or IP whitelisting to trusted administrators only. 3. Implement web application firewall (WAF) rules to detect and block requests containing suspicious shell metacharacters or unusual query parameters targeting these endpoints. 4. Disable or limit the use of the affected endpoints if possible, or configure CyberPanel to reject GET requests on these paths, enforcing POST-only access as intended. 5. Conduct thorough audits of CyberPanel logs for indicators of compromise or exploitation attempts, focusing on unusual GET requests to the vulnerable endpoints. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns. 7. Educate system administrators about the risk and ensure strong operational security practices, including regular backups and incident response readiness. 8. Consider isolating CyberPanel management interfaces from the public internet by placing them behind VPNs or jump hosts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b6247d717aace26c22
Added to database: 10/21/2025, 7:06:30 PM
Last enriched: 10/21/2025, 7:24:33 PM
Last updated: 10/30/2025, 1:40:07 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.