CVE-2013-10052
ZPanel zsudo Local Privilege Escalation
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.
| CWE | CWE-269 |
| Vendor | zpanel project |
| Product | zpanel |
| Published | Aug 4, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for zpanel project zpanel
Be the first to know when new unknown vulnerabilities affecting zpanel project zpanel are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
ZPanel Project / ZPanel
*
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/zpanel_zsudo.rb exploit-db.com: https://www.exploit-db.com/exploits/26451 github.com: https://github.com/zpanel/zpanelx vulncheck.com: https://www.vulncheck.com/advisories/zpanel-zsudo-local-priv-esc
Credits
sinn3r juan vazquez