Skip to main content

CVE-2025-10433: Deserialization in 1Panel-dev MaxKB

Medium
VulnerabilityCVE-2025-10433cvecve-2025-10433
Published: Mon Sep 15 2025 (09/15/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: 1Panel-dev
Product: MaxKB

Description

A vulnerability was determined in 1Panel-dev MaxKB up to 2.0.2/2.1.0. This issue affects some unknown processing of the file /admin/api/workspace/default/tool/debug. Executing manipulation of the argument code can lead to deserialization. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.1.1 is capable of addressing this issue. It is suggested to upgrade the affected component.

AI-Powered Analysis

AILast updated: 09/15/2025, 08:11:30 UTC

Technical Analysis

CVE-2025-10433 is a medium severity vulnerability affecting 1Panel-dev MaxKB versions up to 2.1.0, specifically versions 2.0 through 2.1.0 inclusive. The vulnerability arises from improper handling of deserialization in the processing of the file path /admin/api/workspace/default/tool/debug. An attacker can remotely manipulate the 'code' argument to trigger unsafe deserialization, potentially leading to arbitrary code execution or other malicious outcomes. The vulnerability does not require user interaction or authentication, and the attack vector is network-based with low attack complexity. The CVSS 4.0 base score is 5.3, reflecting a medium severity level. The vulnerability has been publicly disclosed, but no known exploits are reported in the wild yet. The vendor has released version 2.1.1 which patches this issue, and upgrading to this version is recommended to mitigate the risk. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the partial impact metrics (low confidentiality, integrity, and availability impacts).

Potential Impact

For European organizations using 1Panel-dev MaxKB, this vulnerability poses a tangible risk of remote compromise without requiring authentication or user interaction. Exploitation could allow attackers to execute arbitrary code or manipulate application logic, potentially leading to data breaches, service disruption, or unauthorized access. Given that MaxKB is likely used in knowledge base or administrative tooling environments, compromise could expose sensitive internal information or disrupt critical support functions. The medium severity rating suggests moderate risk, but the ease of remote exploitation without authentication elevates concern. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, could face regulatory and reputational damage if exploited. Additionally, the public disclosure increases the likelihood of opportunistic attacks, emphasizing the need for prompt remediation.

Mitigation Recommendations

1. Immediate upgrade to 1Panel-dev MaxKB version 2.1.1 or later, as this version addresses the deserialization vulnerability. 2. Implement network-level access controls to restrict access to the /admin/api/workspace/default/tool/debug endpoint, limiting exposure to trusted IP addresses or VPN users only. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads targeting the vulnerable endpoint. 4. Conduct thorough code audits and penetration testing focused on deserialization and input validation in administrative APIs. 5. Monitor logs for unusual activity related to the 'code' parameter or access to the debug tool endpoint. 6. Establish an incident response plan to quickly address any signs of exploitation. 7. Educate developers and administrators on secure deserialization practices to prevent future vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T10:24:11.530Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7c965d246d5a39a739527

Added to database: 9/15/2025, 8:08:05 AM

Last enriched: 9/15/2025, 8:11:30 AM

Last updated: 9/15/2025, 9:47:38 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats