πŸ” CVE Alert

CVE-2021-47949

HIGH 8.8

CyberPanel 2.1 Authenticated Remote Code Execution via Symlink Attack

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

CyberPanel 2.1 contains a command execution vulnerability that allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through the filemanager controller endpoint. Attackers can manipulate the completeStartingPath parameter in POST requests to /filemanager/controller to create symbolic links, read sensitive files like database credentials, and execute arbitrary shell commands through the /websites/fetchFolderDetails endpoint.

CWE CWE-59
Vendor cyberpanel
Product cyberpanel
Published May 10, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for cyberpanel cyberpanel

Be the first to know when new high vulnerabilities affecting cyberpanel cyberpanel are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Cyberpanel / CyberPanel
<= 2.1

References

NVD β†— CVE.org β†— EPSS Data β†—
exploit-db.com: https://www.exploit-db.com/exploits/50230 cyberpanel.net: https://cyberpanel.net/ github.com: https://github.com/usmannasir/cyberpanel vulncheck.com: https://www.vulncheck.com/advisories/cyberpanel-authenticated-remote-code-execution-via-symlink-attack

Credits

Numan TΓΌrle