CVE-2013-10053
ZPanel <= 10.0.0.2 htpasswd Module Username Command Execution
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges.
| CWE | CWE-78 |
| Vendor | zpanel project |
| Product | zpanel |
| Published | Aug 1, 2025 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for zpanel project zpanel
Be the first to know when new unknown vulnerabilities affecting zpanel project zpanel are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
ZPanel Project / ZPanel
* ≤ 10.0.0.2
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/zpanel_username_exec.rb web.archive.org: https://web.archive.org/web/20130617014355/http://forums.zpanelcp.com/showthread.php?27898-Serious-Remote-Execution-Exploit-in-Zpanel-10-0-0-2 github.com: https://github.com/zpanel/zpanelx vulncheck.com: https://www.vulncheck.com/advisories/zpanel-htpasswd-module-username-command-execution
Credits
shachibista