🔐 CVE Alert

CVE-2013-10052

UNKNOWN 0.0

ZPanel zsudo Local Privilege Escalation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.

CWE CWE-269
Vendor zpanel project
Product zpanel
Published Aug 4, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for zpanel project zpanel

Be the first to know when new unknown vulnerabilities affecting zpanel project zpanel are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

ZPanel Project / ZPanel
*

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/zpanel_zsudo.rb exploit-db.com: https://www.exploit-db.com/exploits/26451 github.com: https://github.com/zpanel/zpanelx vulncheck.com: https://www.vulncheck.com/advisories/zpanel-zsudo-local-priv-esc

Credits

sinn3r juan vazquez