๐Ÿ” CVE Alert

CVE-2018-25117

UNKNOWN 0.0

VestaCP Debian Installer Malicious Backdoor Supply Chain Compromise

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

VestaCP commit a3f0fa1 (2018-05-31) up to commit ee03eff (2018-06-13) contain embedded malicious code that resulted in a supply-chain compromise. New installations created from the compromised installer since at least May 2018 were subject to installation of Linux/ChachaDDoS, a multi-stage DDoS bot that uses Lua for second- and third-stage components. The compromise leaked administrative credentials (base64-encoded admin password and server domain) to an external URL during installation and/or resulted in the installer dropping and executing a DDoS malware payload under local system privileges. Compromised servers were subsequently observed participating in large-scale DDoS activity. Vesta acknowledged exploitation in the wild in October 2018.

CWE CWE-506
Vendor vesta
Product control panel (cp)
Published Oct 15, 2025
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for vesta control panel (cp)

Be the first to know when new unknown vulnerabilities affecting vesta control panel (cp) are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Vesta / Control Panel (CP)
a3f0fa1501d424477786e3e7150bb05c0b99518f < ee03eff016e03cb76fac7ae3a0f9d1ef0f8ee35b

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
welivesecurity.com: https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-distributed-servers-vestacp-installed/ github.com: https://github.com/outroll/vesta/commit/ee03eff016e03cb76fac7ae3a0f9d1ef0f8ee35b#diff-df8da0c91e9086454c60cd468849630dL1270 github.com: https://github.com/outroll/vesta/commit/a3f0fa1501d424477786e3e7150bb05c0b99518f#diff-df8da0c91e9086454c60cd468849630dR1256 forum.vestacp.com: https://forum.vestacp.com/viewtopic.php?f=10&t=17641&p=73282 forum.vestacp.com: https://forum.vestacp.com/viewtopic.php?f=10&t=17641&start=180#p73907 vestacp.com: https://vestacp.com/ github.com: https://github.com/outroll/vesta vulncheck.com: https://www.vulncheck.com/advisories/vestacp-debian-installer-malicious-backdoor-supply-chain-compromise

Credits

Kaspersky Labs