Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34429: CWE-352 Cross-Site Request Forgery (CSRF) in LXware 1Panel

0
High
VulnerabilityCVE-2025-34429cvecve-2025-34429cwe-352
Published: Wed Dec 10 2025 (12/10/2025, 18:23:30 UTC)
Source: CVE Database V5
Vendor/Project: LXware
Product: 1Panel

Description

1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the web port configuration functionality. The port-change endpoint lacks CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a port-change request; when a victim visits it while authenticated, the browser includes valid session cookies and the request succeeds. This allows an attacker to change the port on which the 1Panel web service listens, causing loss of access on the original port and resulting in service disruption or denial of service, and may unintentionally expose the service on an attacker-chosen port.

AI-Powered Analysis

AILast updated: 12/10/2025, 18:51:50 UTC

Technical Analysis

CVE-2025-34429 is a Cross-Site Request Forgery (CSRF) vulnerability identified in LXware's 1Panel software versions 1.10.33 through 2.0.15. The vulnerability resides in the web port configuration functionality, specifically the endpoint responsible for changing the port on which the 1Panel web service listens. This endpoint does not implement standard CSRF defenses such as anti-CSRF tokens or validation of the Origin or Referer HTTP headers. As a result, an attacker can craft a malicious webpage that, when visited by an authenticated user of 1Panel, causes the victim's browser to send a forged request to change the service's listening port. Because the browser automatically includes valid session cookies, the server processes the request as legitimate. This can lead to the web service becoming inaccessible on its original port, effectively causing a denial of service. Additionally, the attacker can set the port to a value that may expose the service to unintended networks or firewall rules, increasing the attack surface. The vulnerability requires no privileges beyond an authenticated session and no special user permissions, but it does require user interaction to visit the malicious page. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, no confidentiality impact, low integrity impact, high availability impact, and no scope change. No public exploits have been reported yet, but the vulnerability's nature makes it a viable vector for service disruption and potential exposure of sensitive services.

Potential Impact

For European organizations, this vulnerability poses a significant risk of service disruption and potential exposure of internal management interfaces. Organizations relying on LXware 1Panel for server or service management may experience denial of service if attackers successfully change the listening port, causing loss of access to critical administrative functions. This can delay incident response and remediation efforts. Furthermore, if the attacker sets the port to one that bypasses firewall rules or exposes the service externally, it could lead to unauthorized access or further exploitation. Given the widespread use of LXware 1Panel in hosting and server management environments, especially in sectors such as finance, healthcare, and government, the impact could be severe. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk profile. The lack of known exploits in the wild suggests organizations have a window to implement mitigations before active exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2025-34429, organizations should immediately upgrade LXware 1Panel to a version where this vulnerability is patched once available. In the absence of an official patch, implement the following practical measures: 1) Restrict access to the 1Panel web interface to trusted networks and IP addresses using firewall rules to reduce exposure. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious port-change requests or CSRF attack patterns. 3) Educate users about the risks of visiting untrusted websites while authenticated to critical management interfaces. 4) Monitor logs for unusual port change requests or configuration changes to detect potential exploitation attempts. 5) Consider implementing network segmentation to isolate management interfaces from general user networks. 6) If feasible, disable or restrict the port-change functionality temporarily until a patch is applied. 7) Use browser security settings or extensions that block cross-site requests or enforce strict same-site cookie policies to reduce CSRF risks. These targeted mitigations go beyond generic advice by focusing on reducing attack surface and detecting exploitation attempts specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939bda4fe7b3954b690add5

Added to database: 12/10/2025, 6:36:20 PM

Last enriched: 12/10/2025, 6:51:50 PM

Last updated: 12/11/2025, 3:49:10 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats