getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
🚨 Marked as known exploited on December 4th, 2024 (5 months ago).
CVE ID: CVE-2024-51378
CVSS Base Severity: CRITICAL
CVSS Base Score: 10.0
CVSS Vector:
Vendor: n/a
Product: n/a
http/cves/2024/CVE-2024-51378.yaml
EPSS Score: 23.11% (probability of being exploited)
EPSS Percentile: 96.62% (scored less or equal to compared to others)
EPSS Date: 2025-02-03 (when was this score calculated)