Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34429: CWE-352 Cross-Site Request Forgery (CSRF) in LXware 1Panel

0
High
VulnerabilityCVE-2025-34429cvecve-2025-34429cwe-352
Published: Wed Dec 10 2025 (12/10/2025, 18:23:30 UTC)
Source: CVE Database V5
Vendor/Project: LXware
Product: 1Panel

Description

1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the web port configuration functionality. The port-change endpoint lacks CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a port-change request; when a victim visits it while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the port on which the 1Panel web service listens, causing loss of access on the original port and resulting in service disruption or denial of service, and may unintentionally expose the service on an attacker-chosen port.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 14:05:27 UTC

Technical Analysis

CVE-2025-34429 is a Cross-Site Request Forgery (CSRF) vulnerability identified in LXware's 1Panel product, specifically in versions 1.10.33 through 2.0.15. The vulnerability resides in the web port configuration functionality, where the endpoint responsible for changing the port on which the 1Panel web service listens does not implement standard CSRF defenses such as anti-CSRF tokens or validation of the Origin or Referer HTTP headers. This security oversight allows an attacker to craft a malicious webpage that, when visited by an authenticated user of the 1Panel interface, automatically submits a port-change request. Because the victim's browser includes valid session cookies, the request is accepted and processed by the server. The attacker can thus change the listening port of the 1Panel service without authentication or elevated privileges. This unauthorized port change can cause denial of service by making the service inaccessible on the original port and may inadvertently expose the service on a port chosen by the attacker, potentially bypassing firewall rules or network segmentation. The vulnerability is exploitable remotely over the network without requiring prior authentication but does require user interaction (visiting a malicious webpage). The CVSS v4.0 score of 7.0 reflects high severity, emphasizing the impact on availability and the ease of exploitation. No public exploits have been reported yet, but the lack of CSRF protections makes this a significant risk for affected deployments. The vulnerability is tracked under CWE-352, which covers CSRF weaknesses. No official patches have been linked yet, so mitigation relies on compensating controls or updates once available.

Potential Impact

The primary impact of this vulnerability is service disruption and potential denial of service due to unauthorized changes to the 1Panel web service's listening port. Organizations relying on 1Panel for server or application management could experience loss of access to the management interface, hindering operational capabilities and incident response. Additionally, changing the port to an attacker-controlled value may expose the service on non-standard ports, potentially bypassing firewall rules or network monitoring, increasing the risk of further exploitation or reconnaissance. This could lead to extended downtime, increased operational costs, and potential security breaches if attackers leverage the new exposure. The vulnerability affects confidentiality minimally but poses a moderate risk to integrity if attackers can manipulate service configurations. Availability is the most impacted security property. Given the network attack vector and no privilege requirements, this vulnerability can be exploited broadly, especially in environments where users frequently access the 1Panel interface via web browsers. The absence of known exploits in the wild currently limits immediate widespread impact, but the ease of exploitation and high severity score indicate a significant threat if weaponized.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the 1Panel web interface to trusted networks and IP addresses via firewall rules or network segmentation to reduce exposure. 2. Implement web application firewall (WAF) rules that detect and block unauthorized port-change requests or requests lacking valid CSRF tokens or proper Origin/Referer headers. 3. Educate users to avoid visiting untrusted or suspicious websites while authenticated to 1Panel to reduce the risk of CSRF exploitation. 4. Monitor logs for unusual port change activities or configuration changes to detect potential exploitation attempts. 5. Once available, promptly apply official patches or updates from LXware that address this CSRF vulnerability. 6. If patching is delayed, consider deploying reverse proxies or API gateways that enforce CSRF protections or validate request origins before forwarding to 1Panel. 7. Review and harden session management policies to limit session lifetime and scope, reducing the window of opportunity for CSRF attacks. 8. Conduct security assessments and penetration testing focused on web interface vulnerabilities to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939bda4fe7b3954b690add5

Added to database: 12/10/2025, 6:36:20 PM

Last enriched: 3/5/2026, 2:05:27 PM

Last updated: 3/25/2026, 2:39:42 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses