🔐 CVE Alert

CVE-2013-10053

UNKNOWN 0.0

ZPanel <= 10.0.0.2 htpasswd Module Username Command Execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges.

CWE CWE-78
Vendor zpanel project
Product zpanel
Published Aug 1, 2025
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for zpanel project zpanel

Be the first to know when new unknown vulnerabilities affecting zpanel project zpanel are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

ZPanel Project / ZPanel
* ≤ 10.0.0.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/zpanel_username_exec.rb web.archive.org: https://web.archive.org/web/20130617014355/http://forums.zpanelcp.com/showthread.php?27898-Serious-Remote-Execution-Exploit-in-Zpanel-10-0-0-2 github.com: https://github.com/zpanel/zpanelx vulncheck.com: https://www.vulncheck.com/advisories/zpanel-htpasswd-module-username-command-execution

Credits

shachibista