Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34429: CWE-352 Cross-Site Request Forgery (CSRF) in LXware 1Panel

0
High
VulnerabilityCVE-2025-34429cvecve-2025-34429cwe-352
Published: Wed Dec 10 2025 (12/10/2025, 18:23:30 UTC)
Source: CVE Database V5
Vendor/Project: LXware
Product: 1Panel

Description

1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the web port configuration functionality. The port-change endpoint lacks CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a port-change request; when a victim visits it while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the port on which the 1Panel web service listens, causing loss of access on the original port and resulting in service disruption or denial of service, and may unintentionally expose the service on an attacker-chosen port.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:36:51 UTC

Technical Analysis

CVE-2025-34429 is a Cross-Site Request Forgery (CSRF) vulnerability identified in LXware's 1Panel management interface versions 1.10.33 through 2.0.15. The vulnerability resides in the web port configuration functionality, specifically the endpoint responsible for changing the port on which the 1Panel web service listens. This endpoint does not implement standard CSRF defenses such as anti-CSRF tokens or validation of the Origin or Referer HTTP headers. As a result, an attacker can craft a malicious webpage that, when visited by an authenticated 1Panel user, causes the victim's browser to send a forged request with valid session cookies. This request changes the listening port of the 1Panel service without the user's consent. The consequences include denial of service on the original port, potentially locking out legitimate administrators, and inadvertent exposure of the service on a port chosen by the attacker, which may bypass firewall rules or monitoring. The vulnerability requires no authentication or privileges on the attacker’s part but does require user interaction (visiting a malicious webpage). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, no confidentiality impact, low integrity impact, high availability impact, and no scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to service availability and operational continuity.

Potential Impact

For European organizations, exploitation of this CSRF vulnerability could lead to significant operational disruptions. The forced port change can cause denial of service by making the 1Panel management interface inaccessible on its default port, potentially delaying critical administrative tasks and incident response. Additionally, if the attacker selects a port that circumvents existing firewall or network segmentation controls, the service could be exposed to unauthorized access or reconnaissance. This could increase the attack surface and risk of further compromise. Organizations relying on LXware 1Panel for managing infrastructure or services may face downtime, impacting business continuity and service delivery. The impact is particularly critical for sectors with high availability requirements such as finance, healthcare, and critical infrastructure prevalent in Europe. Furthermore, the lack of confidentiality impact does not diminish the operational risk, as availability disruptions can have cascading effects on dependent systems and services.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify the version of LXware 1Panel in use and upgrade to a patched version once available from the vendor. In the absence of an official patch, organizations can implement the following specific mitigations: 1) Restrict access to the 1Panel management interface to trusted networks and IP addresses using firewall rules or network segmentation to reduce exposure to malicious webpages. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious port-change requests or requests lacking valid CSRF tokens. 3) Educate users and administrators to avoid visiting untrusted or suspicious websites while authenticated to 1Panel. 4) Implement browser security policies such as Content Security Policy (CSP) and SameSite cookies to reduce the risk of CSRF attacks. 5) Monitor logs for unexpected port changes or configuration modifications to detect potential exploitation attempts early. 6) Consider disabling or restricting the port-change functionality if not required operationally. These targeted mitigations go beyond generic advice by focusing on access control, detection, and user behavior to reduce the attack surface until a vendor patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939bda4fe7b3954b690add5

Added to database: 12/10/2025, 6:36:20 PM

Last enriched: 12/17/2025, 7:36:51 PM

Last updated: 2/7/2026, 1:15:16 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats