Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34430: CWE-352 Cross-Site Request Forgery (CSRF) in LXware 1Panel

0
Medium
VulnerabilityCVE-2025-34430cvecve-2025-34430cwe-352
Published: Wed Dec 10 2025 (12/10/2025, 18:23:14 UTC)
Source: CVE Database V5
Vendor/Project: LXware
Product: 1Panel

Description

1Panel versions 1.10.33 through 2.0.15 contain a cross-site request forgery (CSRF) vulnerability in the panel name management functionality. The affected endpoint does not implement CSRF defenses such as anti-CSRF tokens or Origin/Referer validation. An attacker can craft a malicious webpage that submits a panel-name change request; if a victim visits the page while authenticated, the browser includes valid session cookies and the request succeeds. This allows a remote attacker to change the victim’s panel name to an arbitrary value without consent.

AI-Powered Analysis

AILast updated: 12/10/2025, 19:05:09 UTC

Technical Analysis

CVE-2025-34430 is a Cross-Site Request Forgery (CSRF) vulnerability identified in LXware's 1Panel product, specifically affecting versions from 1.10.33 through 2.0.15. The vulnerability resides in the panel name management functionality where the web endpoint responsible for changing the panel name does not implement standard CSRF defenses such as anti-CSRF tokens or validation of the Origin or Referer HTTP headers. This absence allows an attacker to craft a malicious webpage that silently submits a request to change the panel name when visited by an authenticated user. Because the victim's browser automatically includes valid session cookies, the request is processed successfully without the victim's consent or awareness. The attack vector requires user interaction (visiting the malicious page) but does not require the attacker to have any privileges or authentication. The impact is limited to unauthorized modification of the panel name, which could be leveraged for social engineering, misdirection, or to undermine trust in the system's interface. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction and limited impact on integrity only. No patches or exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

For European organizations using LXware 1Panel, this vulnerability poses a risk primarily to the integrity of the panel's configuration interface. Unauthorized changes to the panel name could confuse administrators or users, potentially facilitating phishing or social engineering attacks by misleading users about the system's identity or status. While the vulnerability does not directly compromise confidentiality or availability, it can undermine trust in the management interface and may serve as a stepping stone for more sophisticated attacks if combined with other vulnerabilities or social engineering techniques. Organizations with web-facing 1Panel instances are at higher risk, especially if users frequently access the panel from browsers susceptible to CSRF attacks. The medium severity indicates a moderate risk that should be mitigated to maintain operational security and user trust.

Mitigation Recommendations

1. Implement immediate compensating controls such as web application firewalls (WAFs) to detect and block CSRF attack patterns targeting the panel name change endpoint. 2. Enforce strict Content Security Policy (CSP) headers to reduce the risk of malicious script execution from untrusted sources. 3. Educate users and administrators to avoid clicking on suspicious links or visiting untrusted websites while authenticated to the 1Panel. 4. If possible, restrict access to the 1Panel interface to trusted IP ranges or VPN-only access to reduce exposure. 5. Monitor web server logs for unusual POST requests to the panel name management endpoint that could indicate exploitation attempts. 6. Advocate for or develop patches that implement anti-CSRF tokens and validate Origin or Referer headers on the affected endpoints. 7. Regularly update and audit the 1Panel software to incorporate security fixes once available. 8. Consider multi-factor authentication (MFA) for panel access to reduce the risk of session hijacking that could compound this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939bda4fe7b3954b690adda

Added to database: 12/10/2025, 6:36:20 PM

Last enriched: 12/10/2025, 7:05:09 PM

Last updated: 12/11/2025, 7:15:33 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats