CVE-2026-23525: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 1Panel-dev 1Panel
1Panel is an open-source, web-based control panel for Linux server management. A stored Cross-Site Scripting (XSS) vulnerability exists in the 1Panel App Store when viewing application details. Malicious scripts can execute in the context of the user’s browser, potentially compromising session data or sensitive system interfaces. All versions of 1Panel up to and including v1.10.33-lts and v2.0.16 are affected. An attacker could publish a malicious application that, when loaded by users (locally or remotely), can execute arbitrary scripts. This may result in theft of user cookies, unauthorized access to system functions, or other actions that compromise the confidentiality, integrity, and availability of the system. The vulnerability is caused by insufficient sanitization of content rendered by the MdEditor component with the `previewOnly` attribute enabled. Specifically, the App Store renders application README content without proper XSS protection, allowing script execution during content rendering; and similar issues exist in system upgrade-related components, which can be fixed by implementing proper XSS sanitization in the MdEditor component. These vulnerabilities can be mitigated by applying proper XSS protection and sanitization when rendering content in the MdEditor component. Safe versions with a patch incorporated are v1.10.34-lts and v2.0.17.
AI Analysis
Technical Summary
CVE-2026-23525 is a stored Cross-Site Scripting (XSS) vulnerability identified in the 1Panel open-source web-based control panel used for Linux server management. The vulnerability arises from improper neutralization of input during web page generation, specifically in the 1Panel App Store's rendering of application README content. The root cause is insufficient sanitization in the MdEditor component when the `previewOnly` attribute is enabled, allowing malicious scripts embedded in application descriptions to execute in the context of the user's browser. This flaw extends to system upgrade-related components with similar rendering issues. An attacker with privileges to publish applications can embed malicious JavaScript payloads that execute when users view application details, potentially leading to session hijacking, unauthorized access to system functions, or other malicious actions compromising confidentiality, integrity, and availability. The vulnerability affects all 1Panel versions prior to v1.10.34-lts and versions from 2.0.0 up to but not including 2.0.17. The CVSS v3.1 score is 6.4, reflecting network attack vector, high attack complexity, required privileges, and user interaction. No known exploits are currently reported in the wild. Remediation involves applying patches that implement proper XSS sanitization in the MdEditor component to ensure safe rendering of user-generated content.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on 1Panel for managing Linux servers that host critical applications or sensitive data. Exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users and gain unauthorized access to system functions, potentially leading to data breaches or system manipulation. The compromise of system integrity and availability could disrupt business operations, particularly in sectors such as finance, healthcare, and government where Linux servers are prevalent. Additionally, the ability to execute arbitrary scripts in user browsers increases the risk of lateral attacks within internal networks. Given the medium CVSS score but high potential impact on confidentiality and integrity, organizations that have not updated to patched versions remain at risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks, especially as threat actors often target unpatched open-source management tools.
Mitigation Recommendations
European organizations should immediately upgrade 1Panel installations to versions v1.10.34-lts or v2.0.17 or later, which include patches addressing the XSS vulnerability. Until patches are applied, restrict publishing privileges to trusted administrators only to reduce the risk of malicious application uploads. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the 1Panel interface. Conduct regular audits of applications published in the 1Panel App Store to detect any suspicious or unauthorized content. Employ web application firewalls (WAFs) with XSS detection capabilities to monitor and block malicious payloads targeting the vulnerable components. Educate users on the risks of interacting with untrusted content within the control panel interface. Finally, monitor logs for unusual activity that may indicate exploitation attempts and maintain an incident response plan tailored to web application vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2026-23525: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in 1Panel-dev 1Panel
Description
1Panel is an open-source, web-based control panel for Linux server management. A stored Cross-Site Scripting (XSS) vulnerability exists in the 1Panel App Store when viewing application details. Malicious scripts can execute in the context of the user’s browser, potentially compromising session data or sensitive system interfaces. All versions of 1Panel up to and including v1.10.33-lts and v2.0.16 are affected. An attacker could publish a malicious application that, when loaded by users (locally or remotely), can execute arbitrary scripts. This may result in theft of user cookies, unauthorized access to system functions, or other actions that compromise the confidentiality, integrity, and availability of the system. The vulnerability is caused by insufficient sanitization of content rendered by the MdEditor component with the `previewOnly` attribute enabled. Specifically, the App Store renders application README content without proper XSS protection, allowing script execution during content rendering; and similar issues exist in system upgrade-related components, which can be fixed by implementing proper XSS sanitization in the MdEditor component. These vulnerabilities can be mitigated by applying proper XSS protection and sanitization when rendering content in the MdEditor component. Safe versions with a patch incorporated are v1.10.34-lts and v2.0.17.
AI-Powered Analysis
Technical Analysis
CVE-2026-23525 is a stored Cross-Site Scripting (XSS) vulnerability identified in the 1Panel open-source web-based control panel used for Linux server management. The vulnerability arises from improper neutralization of input during web page generation, specifically in the 1Panel App Store's rendering of application README content. The root cause is insufficient sanitization in the MdEditor component when the `previewOnly` attribute is enabled, allowing malicious scripts embedded in application descriptions to execute in the context of the user's browser. This flaw extends to system upgrade-related components with similar rendering issues. An attacker with privileges to publish applications can embed malicious JavaScript payloads that execute when users view application details, potentially leading to session hijacking, unauthorized access to system functions, or other malicious actions compromising confidentiality, integrity, and availability. The vulnerability affects all 1Panel versions prior to v1.10.34-lts and versions from 2.0.0 up to but not including 2.0.17. The CVSS v3.1 score is 6.4, reflecting network attack vector, high attack complexity, required privileges, and user interaction. No known exploits are currently reported in the wild. Remediation involves applying patches that implement proper XSS sanitization in the MdEditor component to ensure safe rendering of user-generated content.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on 1Panel for managing Linux servers that host critical applications or sensitive data. Exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users and gain unauthorized access to system functions, potentially leading to data breaches or system manipulation. The compromise of system integrity and availability could disrupt business operations, particularly in sectors such as finance, healthcare, and government where Linux servers are prevalent. Additionally, the ability to execute arbitrary scripts in user browsers increases the risk of lateral attacks within internal networks. Given the medium CVSS score but high potential impact on confidentiality and integrity, organizations that have not updated to patched versions remain at risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks, especially as threat actors often target unpatched open-source management tools.
Mitigation Recommendations
European organizations should immediately upgrade 1Panel installations to versions v1.10.34-lts or v2.0.17 or later, which include patches addressing the XSS vulnerability. Until patches are applied, restrict publishing privileges to trusted administrators only to reduce the risk of malicious application uploads. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the 1Panel interface. Conduct regular audits of applications published in the 1Panel App Store to detect any suspicious or unauthorized content. Employ web application firewalls (WAFs) with XSS detection capabilities to monitor and block malicious payloads targeting the vulnerable components. Educate users on the risks of interacting with untrusted content within the control panel interface. Finally, monitor logs for unusual activity that may indicate exploitation attempts and maintain an incident response plan tailored to web application vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T18:22:43.980Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696d5e25d302b072d901c778
Added to database: 1/18/2026, 10:26:45 PM
Last enriched: 1/26/2026, 7:56:32 PM
Last updated: 2/7/2026, 3:30:04 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.