upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CVE ID: CVE-2024-51567
CVSS Base Severity: CRITICAL
CVSS Base Score: 10.0
CVSS Vector: CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N
Vendor: n/a
Product: n/a
http/cves/2024/CVE-2024-51567.yaml
EPSS Score: 36.7% (probability of being exploited)
EPSS Percentile: 97.29% (scored less or equal to compared to others)
EPSS Date: 2025-03-06 (when was this score calculated)