Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23525: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 1Panel-dev 1Panel

0
Medium
VulnerabilityCVE-2026-23525cvecve-2026-23525cwe-79
Published: Sun Jan 18 2026 (01/18/2026, 22:10:59 UTC)
Source: CVE Database V5
Vendor/Project: 1Panel-dev
Product: 1Panel

Description

1Panel is an open-source, web-based control panel for Linux server management. A stored Cross-Site Scripting (XSS) vulnerability exists in the 1Panel App Store when viewing application details. Malicious scripts can execute in the context of the user’s browser, potentially compromising session data or sensitive system interfaces. All versions of 1Panel up to and including v1.10.33-lts and v2.0.16 are affected. An attacker could publish a malicious application that, when loaded by users (locally or remotely), can execute arbitrary scripts. This may result in theft of user cookies, unauthorized access to system functions, or other actions that compromise the confidentiality, integrity, and availability of the system. The vulnerability is caused by insufficient sanitization of content rendered by the MdEditor component with the `previewOnly` attribute enabled. Specifically, the App Store renders application README content without proper XSS protection, allowing script execution during content rendering; and similar issues exist in system upgrade-related components, which can be fixed by implementing proper XSS sanitization in the MdEditor component. These vulnerabilities can be mitigated by applying proper XSS protection and sanitization when rendering content in the MdEditor component. Safe versions with a patch incorporated are v1.10.34-lts and v2.0.17.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:56:32 UTC

Technical Analysis

CVE-2026-23525 is a stored Cross-Site Scripting (XSS) vulnerability identified in the 1Panel open-source web-based control panel used for Linux server management. The vulnerability arises from improper neutralization of input during web page generation, specifically in the 1Panel App Store's rendering of application README content. The root cause is insufficient sanitization in the MdEditor component when the `previewOnly` attribute is enabled, allowing malicious scripts embedded in application descriptions to execute in the context of the user's browser. This flaw extends to system upgrade-related components with similar rendering issues. An attacker with privileges to publish applications can embed malicious JavaScript payloads that execute when users view application details, potentially leading to session hijacking, unauthorized access to system functions, or other malicious actions compromising confidentiality, integrity, and availability. The vulnerability affects all 1Panel versions prior to v1.10.34-lts and versions from 2.0.0 up to but not including 2.0.17. The CVSS v3.1 score is 6.4, reflecting network attack vector, high attack complexity, required privileges, and user interaction. No known exploits are currently reported in the wild. Remediation involves applying patches that implement proper XSS sanitization in the MdEditor component to ensure safe rendering of user-generated content.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on 1Panel for managing Linux servers that host critical applications or sensitive data. Exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users and gain unauthorized access to system functions, potentially leading to data breaches or system manipulation. The compromise of system integrity and availability could disrupt business operations, particularly in sectors such as finance, healthcare, and government where Linux servers are prevalent. Additionally, the ability to execute arbitrary scripts in user browsers increases the risk of lateral attacks within internal networks. Given the medium CVSS score but high potential impact on confidentiality and integrity, organizations that have not updated to patched versions remain at risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks, especially as threat actors often target unpatched open-source management tools.

Mitigation Recommendations

European organizations should immediately upgrade 1Panel installations to versions v1.10.34-lts or v2.0.17 or later, which include patches addressing the XSS vulnerability. Until patches are applied, restrict publishing privileges to trusted administrators only to reduce the risk of malicious application uploads. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the 1Panel interface. Conduct regular audits of applications published in the 1Panel App Store to detect any suspicious or unauthorized content. Employ web application firewalls (WAFs) with XSS detection capabilities to monitor and block malicious payloads targeting the vulnerable components. Educate users on the risks of interacting with untrusted content within the control panel interface. Finally, monitor logs for unusual activity that may indicate exploitation attempts and maintain an incident response plan tailored to web application vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.980Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696d5e25d302b072d901c778

Added to database: 1/18/2026, 10:26:45 PM

Last enriched: 1/26/2026, 7:56:32 PM

Last updated: 2/7/2026, 3:30:04 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats