Skip to main content

CVE-2025-53363: CWE-73: External Control of File Name or Path in donknap dpanel

Medium
VulnerabilityCVE-2025-53363cvecve-2025-53363cwe-73cwe-22
Published: Fri Aug 22 2025 (08/22/2025, 15:18:01 UTC)
Source: CVE Database V5
Vendor/Project: donknap
Product: dpanel

Description

dpanel is an open source server management panel written in Go. In versions 1.2.0 through 1.7.2, dpanel allows authenticated users to read arbitrary files from the server via the /api/app/compose/get-from-uri API endpoint. The vulnerability exists in the GetFromUri function in app/application/http/controller/compose.go, where the uri parameter is passed directly to os.ReadFile without proper validation or access control. A logged-in attacker can exploit this flaw to read sensitive files from the host system, leading to information disclosure. No patched version is available as of this writing.

AI-Powered Analysis

AILast updated: 08/22/2025, 15:47:53 UTC

Technical Analysis

CVE-2025-53363 is a medium-severity vulnerability affecting the donknap dpanel, an open source server management panel written in Go. The flaw exists in versions 1.2.0 through 1.7.2 within the GetFromUri function located in the app/application/http/controller/compose.go file. Specifically, the vulnerability arises because the uri parameter passed to the /api/app/compose/get-from-uri API endpoint is directly used as an argument to the os.ReadFile function without proper validation or access control. This lack of validation allows an authenticated user to read arbitrary files on the server hosting dpanel. Since the vulnerability requires authentication but no user interaction, an attacker who has valid credentials can exploit this to disclose sensitive information such as configuration files, credentials, or other critical data stored on the server. The vulnerability is categorized under CWE-73 (External Control of File Name or Path) and CWE-22 (Path Traversal), indicating that the root cause is improper handling of file path inputs leading to unauthorized file access. No patches or fixed versions are currently available, increasing the risk for organizations using affected versions. The CVSS v4.0 base score is 4.8 (medium), reflecting network attack vector, low attack complexity, and the requirement for high privileges (authenticated user). There are no known exploits in the wild at this time, but the vulnerability’s nature makes it a potential target for attackers aiming to gather sensitive information from compromised servers.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data exposure if dpanel is used to manage servers within their infrastructure. The ability for an authenticated user to read arbitrary files could lead to leakage of critical information such as private keys, configuration files, or personal data protected under GDPR. This could result in regulatory non-compliance, reputational damage, and potential financial penalties. Additionally, attackers could leverage disclosed information to escalate privileges or pivot within the network, increasing the overall security risk. Organizations relying on dpanel for server management should be aware that the vulnerability affects confidentiality primarily, with no direct impact on integrity or availability. However, the indirect consequences of information disclosure could be severe, especially in sectors handling sensitive or regulated data such as finance, healthcare, or government services in Europe.

Mitigation Recommendations

Given that no official patch is available, European organizations should implement immediate compensating controls. First, restrict access to the dpanel management interface to trusted internal networks or VPNs to limit exposure. Enforce strong authentication mechanisms and monitor user activity for suspicious access patterns. Implement strict role-based access control to minimize the number of users with authentication privileges. Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious API calls targeting the /api/app/compose/get-from-uri endpoint. If feasible, conduct code review and apply temporary input validation or sanitization on the uri parameter to prevent path traversal attempts. Organizations should also plan for rapid patch deployment once a fix is released and conduct thorough audits of servers managed by dpanel to detect any signs of exploitation or data exfiltration. Regular backups and incident response readiness are advised to mitigate potential downstream effects.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-27T12:57:16.121Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a88da0ad5a09ad001ff897

Added to database: 8/22/2025, 3:32:48 PM

Last enriched: 8/22/2025, 3:47:53 PM

Last updated: 8/22/2025, 4:31:48 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats